WorldWideScience

Sample records for hidden assumptions defines

  1. A Proposal for Testing Local Realism Without Using Assumptions Related to Hidden Variable States

    Science.gov (United States)

    Ryff, Luiz Carlos

    1996-01-01

    A feasible experiment is discussed which allows us to prove a Bell's theorem for two particles without using an inequality. The experiment could be used to test local realism against quantum mechanics without the introduction of additional assumptions related to hidden variables states. Only assumptions based on direct experimental observation are needed.

  2. Drug policy in sport: hidden assumptions and inherent contradictions.

    Science.gov (United States)

    Smith, Aaron C T; Stewart, Bob

    2008-03-01

    This paper considers the assumptions underpinning the current drugs-in-sport policy arrangements. We examine the assumptions and contradictions inherent in the policy approach, paying particular attention to the evidence that supports different policy arrangements. We find that the current anti-doping policy of the World Anti-Doping Agency (WADA) contains inconsistencies and ambiguities. WADA's policy position is predicated upon four fundamental principles; first, the need for sport to set a good example; secondly, the necessity of ensuring a level playing field; thirdly, the responsibility to protect the health of athletes; and fourthly, the importance of preserving the integrity of sport. A review of the evidence, however, suggests that sport is a problematic institution when it comes to setting a good example for the rest of society. Neither is it clear that sport has an inherent or essential integrity that can only be sustained through regulation. Furthermore, it is doubtful that WADA's anti-doping policy is effective in maintaining a level playing field, or is the best means of protecting the health of athletes. The WADA anti-doping policy is based too heavily on principals of minimising drug use, and gives insufficient weight to the minimisation of drug-related harms. As a result drug-related harms are being poorly managed in sport. We argue that anti-doping policy in sport would benefit from placing greater emphasis on a harm minimisation model.

  3. A Step-Indexed Kripke Model of Hidden State via Recursive Properties on Recursively Defined Metric Spaces

    DEFF Research Database (Denmark)

    Schwinghammer, Jan; Birkedal, Lars; Støvring, Kristian

    2011-01-01

    ´eraud and Pottier’s type and capability system including both frame and anti-frame rules. The model is a possible worlds model based on the operational semantics and step-indexed heap relations, and the worlds are constructed as a recursively defined predicate on a recursively defined metric space. We also extend...

  4. A step-indexed Kripke model of hidden state via recursive properties on recursively defined metric spaces

    DEFF Research Database (Denmark)

    Birkedal, Lars; Schwinghammer, Jan; Støvring, Kristian

    2010-01-01

    for Chargu´eraud and Pottier’s type and capability system including frame and anti-frame rules, based on the operational semantics and step-indexed heap relations. The worlds are constructed as a recursively defined predicate on a recursively defined metric space, which provides a considerably simpler...

  5. False assumptions.

    Science.gov (United States)

    Swaminathan, M

    1997-01-01

    Indian women do not have to be told the benefits of breast feeding or "rescued from the clutches of wicked multinational companies" by international agencies. There is no proof that breast feeding has declined in India; in fact, a 1987 survey revealed that 98% of Indian women breast feed. Efforts to promote breast feeding among the middle classes rely on such initiatives as the "baby friendly" hospital where breast feeding is promoted immediately after birth. This ignores the 76% of Indian women who give birth at home. Blaming this unproved decline in breast feeding on multinational companies distracts attention from more far-reaching and intractable effects of social change. While the Infant Milk Substitutes Act is helpful, it also deflects attention from more pressing issues. Another false assumption is that Indian women are abandoning breast feeding to comply with the demands of employment, but research indicates that most women give up employment for breast feeding, despite the economic cost to their families. Women also seek work in the informal sector to secure the flexibility to meet their child care responsibilities. Instead of being concerned about "teaching" women what they already know about the benefits of breast feeding, efforts should be made to remove the constraints women face as a result of their multiple roles and to empower them with the support of families, governmental policies and legislation, employers, health professionals, and the media.

  6. Special report on taxation and reimbursement. Recovering excess funds from a defined-benefit pension plan: don't forget the hidden costs!

    Science.gov (United States)

    Renas, D A; Hoffman, S F

    1989-10-01

    In light of the pitfalls and hidden costs associated with recovering excess pension plan funds, providers may consider examining more conventional sources of raising capital before proceeding. In any event, the process should always be initiated by a careful cost-benefit analysis conducted by the employer, with the help of pension consultants and counsel.

  7. Hidden Liquidity

    OpenAIRE

    Cebiroglu, Gökhan; Horst, Ulrich

    2012-01-01

    We cross-sectionally analyze the presence of aggregated hidden depth and trade volume in the S&P 500 and identify its key determinants. We find that the spread is the main predictor for a stock’s hidden dimension, both in terms of traded and posted liquidity. Our findings moreover suggest that large hidden orders are associated with larger transaction costs, higher price impact and increased volatility. In particular, as large hidden orders fail to attract (latent) liquidity to the market, hi...

  8. Multiverse Assumptions and Philosophy

    Directory of Open Access Journals (Sweden)

    James R. Johnson

    2018-02-01

    Full Text Available Multiverses are predictions based on theories. Focusing on each theory’s assumptions is key to evaluating a proposed multiverse. Although accepted theories of particle physics and cosmology contain non-intuitive features, multiverse theories entertain a host of “strange” assumptions classified as metaphysical (outside objective experience, concerned with fundamental nature of reality, ideas that cannot be proven right or wrong topics such as: infinity, duplicate yous, hypothetical fields, more than three space dimensions, Hilbert space, advanced civilizations, and reality established by mathematical relationships. It is easy to confuse multiverse proposals because many divergent models exist. This overview defines the characteristics of eleven popular multiverse proposals. The characteristics compared are: initial conditions, values of constants, laws of nature, number of space dimensions, number of universes, and fine tuning explanations. Future scientific experiments may validate selected assumptions; but until they do, proposals by philosophers may be as valid as theoretical scientific theories.

  9. Delirium superimposed on dementia: defining disease states and course from longitudinal measurements of a multivariate index using latent class analysis and hidden Markov chains.

    Science.gov (United States)

    Ciampi, Antonio; Dyachenko, Alina; Cole, Martin; McCusker, Jane

    2011-12-01

    The study of mental disorders in the elderly presents substantial challenges due to population heterogeneity, coexistence of different mental disorders, and diagnostic uncertainty. While reliable tools have been developed to collect relevant data, new approaches to study design and analysis are needed. We focus on a new analytic approach. Our framework is based on latent class analysis and hidden Markov chains. From repeated measurements of a multivariate disease index, we extract the notion of underlying state of a patient at a time point. The course of the disorder is then a sequence of transitions among states. States and transitions are not observable; however, the probability of being in a state at a time point, and the transition probabilities from one state to another over time can be estimated. Data from 444 patients with and without diagnosis of delirium and dementia were available from a previous study. The Delirium Index was measured at diagnosis, and at 2 and 6 months from diagnosis. Four latent classes were identified: fairly healthy, moderately ill, clearly sick, and very sick. Dementia and delirium could not be separated on the basis of these data alone. Indeed, as the probability of delirium increased, so did the probability of decline of mental functions. Eight most probable courses were identified, including good and poor stable courses, and courses exhibiting various patterns of improvement. Latent class analysis and hidden Markov chains offer a promising tool for studying mental disorders in the elderly. Its use may show its full potential as new data become available.

  10. The Hidden Reason Behind Children's Misbehavior.

    Science.gov (United States)

    Nystul, Michael S.

    1986-01-01

    Discusses hidden reason theory based on the assumptions that: (1) the nature of people is positive; (2) a child's most basic psychological need is involvement; and (3) a child has four possible choices in life (good somebody, good nobody, bad somebody, or severely mentally ill.) A three step approach for implementing hidden reason theory is…

  11. An impossibility theorem for parameter independent hidden variable theories

    Science.gov (United States)

    Leegwater, Gijs

    2016-05-01

    Recently, Roger Colbeck and Renato Renner (C&R) have claimed that '[n]o extension of quantum theory can have improved predictive power' (Colbeck & Renner, 2011, 2012b). If correct, this is a spectacular impossibility theorem for hidden variable theories, which is more general than the theorems of Bell (1964) and Leggett (2003). Also, C&R have used their claim in attempt to prove that a system's quantum-mechanical wave function is in a one-to-one correspondence with its 'ontic' state (Colbeck & Renner, 2012a). C&R's claim essentially means that in any hidden variable theory that is compatible with quantum-mechanical predictions, probabilities of measurement outcomes are independent of these hidden variables. This makes such variables otiose. On closer inspection, however, the generality and validity of the claim can be contested. First, it is based on an assumption called 'Freedom of Choice'. As the name suggests, this assumption involves the independence of an experimenter's choice of measurement settings. But in the way C&R define this assumption, a no-signalling condition is surreptitiously presupposed, making the assumption less innocent than it sounds. When using this definition, any hidden variable theory violating parameter independence, such as Bohmian Mechanics, is immediately shown to be incompatible with quantum-mechanical predictions. Also, the argument of C&R is hard to follow and their mathematical derivation contains several gaps, some of which cannot be closed in the way they suggest. We shall show that these gaps can be filled. The issue with the 'Freedom of Choice' assumption can be circumvented by explicitly assuming parameter independence. This makes the result less general, but better founded. We then obtain an impossibility theorem for hidden variable theories satisfying parameter independence only. As stated above, such hidden variable theories are impossible in the sense that any supplemental variables have no bearing on outcome probabilities

  12. Contextuality under weak assumptions

    International Nuclear Information System (INIS)

    Simmons, Andrew W; Rudolph, Terry; Wallman, Joel J; Pashayan, Hakop; Bartlett, Stephen D

    2017-01-01

    The presence of contextuality in quantum theory was first highlighted by Bell, Kochen and Specker, who discovered that for quantum systems of three or more dimensions, measurements could not be viewed as deterministically revealing pre-existing properties of the system. More precisely, no model can assign deterministic outcomes to the projectors of a quantum measurement in a way that depends only on the projector and not the context (the full set of projectors) in which it appeared, despite the fact that the Born rule probabilities associated with projectors are independent of the context. A more general, operational definition of contextuality introduced by Spekkens, which we will term ‘probabilistic contextuality’, drops the assumption of determinism and allows for operations other than measurements to be considered contextual. Even two-dimensional quantum mechanics can be shown to be contextual under this generalised notion. Probabilistic noncontextuality represents the postulate that elements of an operational theory that cannot be distinguished from each other based on the statistics of arbitrarily many repeated experiments (they give rise to the same operational probabilities) are ontologically identical. In this paper, we introduce a framework that enables us to distinguish between different noncontextuality assumptions in terms of the relationships between the ontological representations of objects in the theory given a certain relation between their operational representations. This framework can be used to motivate and define a ‘possibilistic’ analogue, encapsulating the idea that elements of an operational theory that cannot be unambiguously distinguished operationally can also not be unambiguously distinguished ontologically. We then prove that possibilistic noncontextuality is equivalent to an alternative notion of noncontextuality proposed by Hardy. Finally, we demonstrate that these weaker noncontextuality assumptions are sufficient to prove

  13. Hidden variables and locality in quantum theory

    International Nuclear Information System (INIS)

    Shiva, Vandana.

    1978-12-01

    The status of hidden variables in quantum theory has been debated since the 1920s. The author examines the no-hidden-variable theories of von Neumann, Kochen, Specker and Bell, and finds that they all share one basic assumption: averaging over the hidden variables should reproduce the quantum mechanical probabilities. Von Neumann also makes a linearity assumption, Kochen and Specker require the preservation of certain functional relations between magnitudes, and Bell proposes a locality condition. It has been assumed that the extrastatistical requirements are needed to serve as criteria of success for the introduction of hidden variables because the statistical condition is trivially satisfied, and that Bell's result is based on a locality condition that is physically motivated. The author shows that the requirement of weak locality, which is not physically motivated, is enough to give Bell's result. The proof of Bell's inequality works equally well for any pair of commuting magnitudes satisfying a condition called the degeneracy principle. None of the no-hidden-variable proofs apply to a class of hidden variable theories that are not phase-space reconstructions of quantum mechanics. The author discusses one of these theories, the Bohm-Bub theory, and finds that hidden variable theories that re all the quantum statistics, for single and sequential measurements, must introduce a randomization process for the hidden variables after each measurement. The philosophical significance of this theory lies in the role it can play in solving the conceptual puzzles posed by quantum theory

  14. Hidden assumptions in the derivation of the theorem of Bell

    International Nuclear Information System (INIS)

    Hess, Karl; Raedt, Hans De; Michielsen, Kristel

    2012-01-01

    John Bell's inequalities have already been considered by Boole in 1862. Boole established a one-to-one correspondence between experimental outcomes and mathematical abstractions of his probability theory. His abstractions are two-valued functions that permit the logical operations AND, OR and NOT and are the elements of an algebra. Violation of the inequalities indicated to Boole an inconsistency of definition of the abstractions and/or the necessity to revise the algebra. It is demonstrated in this paper, that a violation of Bell's inequality by Einstein-Podolsky-Rosen type of experiments can be explained by Boole's ideas. Violations of Bell's inequality also call for a revision of the mathematical abstractions and corresponding algebra. It will be shown that this particular view of Bell's inequalities points toward an incompleteness of quantum mechanics, rather than to any superluminal propagation or influences at a distance.

  15. Hidden assumptions in the derivation of the theorem of Bell

    NARCIS (Netherlands)

    Hess, Karl; De Raedt, Hans; Michielsen, Kristel

    2012-01-01

    John Bell's inequalities have already been considered by Boole in 1862. Boole established a one-to-one correspondence between experimental outcomes and mathematical abstractions of his probability theory. His abstractions are two-valued functions that permit the logical operations AND, OR and NOT

  16. Helioscope bounds on hidden sector photons

    International Nuclear Information System (INIS)

    Redondo, J.

    2008-01-01

    The flux of hypothetical ''hidden photons'' from the Sun is computed under the assumption that they interact with normal matter only through kinetic mixing with the ordinary standard model photon. Requiring that the exotic luminosity is smaller than the standard photon luminosity provides limits for the mixing parameter down to χ -14 , depending on the hidden photon mass. Furthermore, it is pointed point out that helioscopes looking for solar axions are also sensitive to hidden photons. The recent results of the CAST collaboration are used to further constrain the mixing parameter χ at low masses (m γ' <1 eV) where the luminosity bound is weaker. In this regime the solar hidden photon ux has a sizable contribution of longitudinally polarized hidden photons of low energy which are invisible for current helioscopes. (orig.)

  17. Hidden loss

    DEFF Research Database (Denmark)

    Kieffer-Kristensen, Rikke; Johansen, Karen Lise Gaardsvig

    2013-01-01

    to participate. RESULTS: All children were affected by their parents' ABI and the altered family situation. The children's expressions led the authors to identify six themes, including fear of losing the parent, distress and estrangement, chores and responsibilities, hidden loss, coping and support. The main......PRIMARY OBJECTIVE: The purpose of this study was to listen to and learn from children showing high levels of post-traumatic stress symptoms after parental acquired brain injury (ABI), in order to achieve an in-depth understanding of the difficulties the children face in their everyday lives...... finding indicates that the children experienced numerous losses, many of which were often suppressed or neglected by the children to protect the ill parents. CONCLUSIONS: The findings indicated that the children seemed to make a special effort to hide their feelings of loss and grief in order to protect...

  18. Hidden Curriculum: An Analytical Definition

    Directory of Open Access Journals (Sweden)

    Mohammad Reza Andarvazh

    2018-03-01

    Full Text Available Background: The concept of hidden curriculum was first used by Philip Jackson in 1968, and Hafferty brought this concept to the medical education. Many of the subjects that medical students learn are attributed to this curriculum. So far several definitions have been presented for the hidden curriculum, which on the one hand made this concept richer, and on the other hand, led to confusion and ambiguity.This paper tries to provide a clear and comprehensive definition of it.Methods: In this study, concept analysis of McKenna method was used. Using keywords and searching in the databases, 561 English and 26 Persian references related to the concept was found, then by limitingthe research scope, 125 abstracts and by finding more relevant references, 55 articles were fully studied.Results: After analyzing the definitions by McKenna method, the hidden curriculum is defined as follows: The hidden curriculum is a hidden, powerful, intrinsic in organizational structure and culture and sometimes contradictory message, conveyed implicitly and tacitly in the learning environment by structural and human factors and its contents includes cultural habits and customs, norms, values, belief systems, attitudes, skills, desires and behavioral and social expectations can have a positive or negative effect, unplanned, neither planners nor teachers, nor learners are aware of it. The ultimate consequence of the hidden curriculum includes reproducing the existing class structure, socialization, and familiarizing learners for transmission and joining the professional world.Conclusion: Based on the concept analysis, we arrived at an analytical definition of the hidden curriculum that could be useful for further studies in this area.Keywords: CONCEPT ANALYSIS, HIDDEN CURRICULUM, MCKENNA’S METHOD

  19. Adult Learning Assumptions

    Science.gov (United States)

    Baskas, Richard S.

    2011-01-01

    The purpose of this study is to examine Knowles' theory of andragogy and his six assumptions of how adults learn while providing evidence to support two of his assumptions based on the theory of andragogy. As no single theory explains how adults learn, it can best be assumed that adults learn through the accumulation of formal and informal…

  20. Asymptotics for Estimating Equations in Hidden Markov Models

    DEFF Research Database (Denmark)

    Hansen, Jørgen Vinsløv; Jensen, Jens Ledet

    Results on asymptotic normality for the maximum likelihood estimate in hidden Markov models are extended in two directions. The stationarity assumption is relaxed, which allows for a covariate process influencing the hidden Markov process. Furthermore a class of estimating equations is considered...

  1. Secret Codes: The Hidden Curriculum of Semantic Web Technologies

    Science.gov (United States)

    Edwards, Richard; Carmichael, Patrick

    2012-01-01

    There is a long tradition in education of examination of the hidden curriculum, those elements which are implicit or tacit to the formal goals of education. This article draws upon that tradition to open up for investigation the hidden curriculum and assumptions about students and knowledge that are embedded in the coding undertaken to facilitate…

  2. Sensitivity Analysis Without Assumptions.

    Science.gov (United States)

    Ding, Peng; VanderWeele, Tyler J

    2016-05-01

    Unmeasured confounding may undermine the validity of causal inference with observational studies. Sensitivity analysis provides an attractive way to partially circumvent this issue by assessing the potential influence of unmeasured confounding on causal conclusions. However, previous sensitivity analysis approaches often make strong and untestable assumptions such as having an unmeasured confounder that is binary, or having no interaction between the effects of the exposure and the confounder on the outcome, or having only one unmeasured confounder. Without imposing any assumptions on the unmeasured confounder or confounders, we derive a bounding factor and a sharp inequality such that the sensitivity analysis parameters must satisfy the inequality if an unmeasured confounder is to explain away the observed effect estimate or reduce it to a particular level. Our approach is easy to implement and involves only two sensitivity parameters. Surprisingly, our bounding factor, which makes no simplifying assumptions, is no more conservative than a number of previous sensitivity analysis techniques that do make assumptions. Our new bounding factor implies not only the traditional Cornfield conditions that both the relative risk of the exposure on the confounder and that of the confounder on the outcome must satisfy but also a high threshold that the maximum of these relative risks must satisfy. Furthermore, this new bounding factor can be viewed as a measure of the strength of confounding between the exposure and the outcome induced by a confounder.

  3. Sociology of Hidden Curriculum

    Directory of Open Access Journals (Sweden)

    Alireza Moradi

    2017-06-01

    Full Text Available This paper reviews the concept of hidden curriculum in the sociological theories and wants to explain sociological aspects of formation of hidden curriculum. The main question concentrates on the theoretical approaches in which hidden curriculum is explained sociologically.For this purpose it was applied qualitative research methodology. The relevant data include various sociological concepts and theories of hidden curriculum collected by the documentary method. The study showed a set of rules, procedures, relationships and social structure of education have decisive role in the formation of hidden curriculum. A hidden curriculum reinforces by existed inequalities among learners (based on their social classes or statues. There is, in fact, a balance between the learner's "knowledge receptions" with their "inequality proportion".The hidden curriculum studies from different major sociological theories such as Functionalism, Marxism and critical theory, Symbolic internationalism and Feminism. According to the functionalist perspective a hidden curriculum has a social function because it transmits social values. Marxists and critical thinkers correlate between hidden curriculum and the totality of social structure. They depicts that curriculum prepares learners for the exploitation in the work markets. Symbolic internationalism rejects absolute hegemony of hidden curriculum on education and looks to the socialization as a result of interaction between learner and instructor. Feminism theory also considers hidden curriculum as a vehicle which legitimates gender stereotypes.

  4. Perspective: Disclosing hidden sources of funding.

    Science.gov (United States)

    Resnik, David B

    2009-09-01

    In this article, the author discusses ethical and policy issues related to the disclosure of hidden sources of funding in research. The author argues that authors have an ethical obligation to disclose hidden sources of funding and that journals should adopt policies to enforce this obligation. Journal policies should require disclosure of hidden sources of funding that authors know about and that have a direct relation to their research. To stimulate this discussion, the author describes a recent case: investigators who conducted a lung cancer screening study had received funding from a private foundation that was supported by a tobacco company, but they did not disclose this relationship to the journal. Investigators and journal editors must be prepared to deal with these issues in a manner that promotes honesty, transparency, fairness, and accountability in research. The development of well-defined, reasonable policies pertaining to hidden sources of funding can be a step in this direction.

  5. POVMs and hidden variables

    International Nuclear Information System (INIS)

    Stairs, Allen

    2007-01-01

    Recent results by Paul Busch and Adan Cabello claim to show that by appealing to POVMs, non-contextual hidden variables can be ruled out in two dimensions. While the results of Busch and Cabello are mathematically correct, interpretive problems render them problematic as no hidden variable proofs

  6. Partially Hidden Markov Models

    DEFF Research Database (Denmark)

    Forchhammer, Søren Otto; Rissanen, Jorma

    1996-01-01

    Partially Hidden Markov Models (PHMM) are introduced. They differ from the ordinary HMM's in that both the transition probabilities of the hidden states and the output probabilities are conditioned on past observations. As an illustration they are applied to black and white image compression where...

  7. Testing Our Fundamental Assumptions

    Science.gov (United States)

    Kohler, Susanna

    2016-06-01

    Science is all about testing the things we take for granted including some of the most fundamental aspects of how we understand our universe. Is the speed of light in a vacuum the same for all photons regardless of their energy? Is the rest mass of a photon actually zero? A series of recent studies explore the possibility of using transient astrophysical sources for tests!Explaining Different Arrival TimesArtists illustration of a gamma-ray burst, another extragalactic transient, in a star-forming region. [NASA/Swift/Mary Pat Hrybyk-Keith and John Jones]Suppose you observe a distant transient astrophysical source like a gamma-ray burst, or a flare from an active nucleus and two photons of different energies arrive at your telescope at different times. This difference in arrival times could be due to several different factors, depending on how deeply you want to question some of our fundamental assumptions about physics:Intrinsic delayThe photons may simply have been emitted at two different times by the astrophysical source.Delay due to Lorentz invariance violationPerhaps the assumption that all massless particles (even two photons with different energies) move at the exact same velocity in a vacuum is incorrect.Special-relativistic delayMaybe there is a universal speed for massless particles, but the assumption that photons have zero rest mass is wrong. This, too, would cause photon velocities to be energy-dependent.Delay due to gravitational potentialPerhaps our understanding of the gravitational potential that the photons experience as they travel is incorrect, also causing different flight times for photons of different energies. This would mean that Einsteins equivalence principle, a fundamental tenet of general relativity (GR), is incorrect.If we now turn this problem around, then by measuring the arrival time delay between photons of different energies from various astrophysical sources the further away, the better we can provide constraints on these

  8. Improved hidden Markov model for nosocomial infections.

    Science.gov (United States)

    Khader, Karim; Leecaster, Molly; Greene, Tom; Samore, Matthew; Thomas, Alun

    2014-12-01

    We propose a novel hidden Markov model (HMM) for parameter estimation in hospital transmission models, and show that commonly made simplifying assumptions can lead to severe model misspecification and poor parameter estimates. A standard HMM that embodies two commonly made simplifying assumptions, namely a fixed patient count and binomially distributed detections is compared with a new alternative HMM that does not require these simplifying assumptions. Using simulated data, we demonstrate how each of the simplifying assumptions used by the standard model leads to model misspecification, whereas the alternative model results in accurate parameter estimates. © The Authors 2013. Published by Oxford University Press on behalf of the Institute of Mathematics and its Applications. All rights reserved.

  9. Hidden gauge symmetry

    International Nuclear Information System (INIS)

    O'Raifeartaigh, L.

    1979-01-01

    This review describes the principles of hidden gauge symmetry and of its application to the fundamental interactions. The emphasis is on the structure of the theory rather than on the technical details and, in order to emphasise the structure, gauge symmetry and hidden symmetry are first treated as independent phenomena before being combined into a single (hidden gauge symmetric) theory. The main application of the theory is to the weak and electromagnetic interactions of the elementary particles, and although models are used for comparison with experiment and for illustration, emphasis is placed on those features of the application which are model-independent. (author)

  10. The hidden universe

    International Nuclear Information System (INIS)

    Disney, M.

    1985-01-01

    Astronomer Disney has followed a somewhat different tack than that of most popular books on cosmology by concentrating on the notion of hidden (as in not directly observable by its own radiation) matter in the universe

  11. Locating Hidden Servers

    National Research Council Canada - National Science Library

    Oeverlier, Lasse; Syverson, Paul F

    2006-01-01

    .... Announced properties include server resistance to distributed DoS. Both the EFF and Reporters Without Borders have issued guides that describe using hidden services via Tor to protect the safety of dissidents as well as to resist censorship...

  12. Hidden charged dark matter

    International Nuclear Information System (INIS)

    Feng, Jonathan L.; Kaplinghat, Manoj; Tu, Huitzu; Yu, Hai-Bo

    2009-01-01

    Can dark matter be stabilized by charge conservation, just as the electron is in the standard model? We examine the possibility that dark matter is hidden, that is, neutral under all standard model gauge interactions, but charged under an exact (\\rm U)(1) gauge symmetry of the hidden sector. Such candidates are predicted in WIMPless models, supersymmetric models in which hidden dark matter has the desired thermal relic density for a wide range of masses. Hidden charged dark matter has many novel properties not shared by neutral dark matter: (1) bound state formation and Sommerfeld-enhanced annihilation after chemical freeze out may reduce its relic density, (2) similar effects greatly enhance dark matter annihilation in protohalos at redshifts of z ∼ 30, (3) Compton scattering off hidden photons delays kinetic decoupling, suppressing small scale structure, and (4) Rutherford scattering makes such dark matter self-interacting and collisional, potentially impacting properties of the Bullet Cluster and the observed morphology of galactic halos. We analyze all of these effects in a WIMPless model in which the hidden sector is a simplified version of the minimal supersymmetric standard model and the dark matter is a hidden sector stau. We find that charged hidden dark matter is viable and consistent with the correct relic density for reasonable model parameters and dark matter masses in the range 1 GeV ∼ X ∼< 10 TeV. At the same time, in the preferred range of parameters, this model predicts cores in the dark matter halos of small galaxies and other halo properties that may be within the reach of future observations. These models therefore provide a viable and well-motivated framework for collisional dark matter with Sommerfeld enhancement, with novel implications for astrophysics and dark matter searches

  13. Life Support Baseline Values and Assumptions Document

    Science.gov (United States)

    Anderson, Molly S.; Ewert, Michael K.; Keener, John F.

    2018-01-01

    The Baseline Values and Assumptions Document (BVAD) provides analysts, modelers, and other life support researchers with a common set of values and assumptions which can be used as a baseline in their studies. This baseline, in turn, provides a common point of origin from which many studies in the community may depart, making research results easier to compare and providing researchers with reasonable values to assume for areas outside their experience. This document identifies many specific physical quantities that define life support systems, serving as a general reference for spacecraft life support system technology developers.

  14. Do unreal assumptions pervert behaviour?

    DEFF Research Database (Denmark)

    Petersen, Verner C.

    of the basic assumptions underlying the theories found in economics. Assumptions relating to the primacy of self-interest, to resourceful, evaluative, maximising models of man, to incentive systems and to agency theory. The major part of the paper then discusses how these assumptions and theories may pervert......-interested way nothing will. The purpose of this paper is to take a critical look at some of the assumptions and theories found in economics and discuss their implications for the models and the practices found in the management of business. The expectation is that the unrealistic assumptions of economics have...... become taken for granted and tacitly included into theories and models of management. Guiding business and manage¬ment to behave in a fashion that apparently makes these assumptions become "true". Thus in fact making theories and models become self-fulfilling prophecies. The paper elucidates some...

  15. On the LHC sensitivity for non-thermalised hidden sectors

    Science.gov (United States)

    Kahlhoefer, Felix

    2018-04-01

    We show under rather general assumptions that hidden sectors that never reach thermal equilibrium in the early Universe are also inaccessible for the LHC. In other words, any particle that can be produced at the LHC must either have been in thermal equilibrium with the Standard Model at some point or must be produced via the decays of another hidden sector particle that has been in thermal equilibrium. To reach this conclusion, we parametrise the cross section connecting the Standard Model to the hidden sector in a very general way and use methods from linear programming to calculate the largest possible number of LHC events compatible with the requirement of non-thermalisation. We find that even the HL-LHC cannot possibly produce more than a few events with energy above 10 GeV involving states from a non-thermalised hidden sector.

  16. Search for Hidden Particles

    CERN Multimedia

    Solovev, V

    The SHiP Experiment is a new general-purpose fixed target facility at the SPS to search for hidden particles as predicted by a very large number of recently elaborated models of Hidden Sectors which are capable of accommodating dark matter, neutrino oscillations, and the origin of the full baryon asymmetry in the Universe. Specifically, the experiment is aimed at searching for very weakly interacting long lived particles including Heavy Neutral Leptons - right-handed partners of the active neutrinos; light supersymmetric particles - sgoldstinos, etc.; scalar, axion and vector portals to the hidden sector. The high intensity of the SPS and in particular the large production of charm mesons with the 400 GeV beam allow accessing a wide variety of light long-lived exotic particles of such models and of SUSY. Moreover, the facility is ideally suited to study the interactions of tau neutrinos.

  17. The hidden values

    DEFF Research Database (Denmark)

    Rasmussen, Birgitte; Jensen, Karsten Klint

    “The Hidden Values - Transparency in Decision-Making Processes Dealing with Hazardous Activities”. The report seeks to shed light on what is needed to create a transparent framework for political and administrative decisions on the use of GMOs and chemical products. It is our hope that the report...

  18. Legal assumptions for private company claim for additional (supplementary payment

    Directory of Open Access Journals (Sweden)

    Šogorov Stevan

    2011-01-01

    Full Text Available Subject matter of analyze in this article are legal assumptions which must be met in order to enable private company to call for additional payment. After introductory remarks discussion is focused on existence of provisions regarding additional payment in formation contract, or in shareholders meeting general resolution, as starting point for company's claim. Second assumption is concrete resolution of shareholders meeting which creates individual obligations for additional payments. Third assumption is defined as distinctness regarding sum of payment and due date. Sending of claim by relevant company body is set as fourth legal assumption for realization of company's right to claim additional payments from member of private company.

  19. A masking index for quantifying hidden glitches

    OpenAIRE

    Berti-Equille, Laure; Loh, J. M.; Dasu, T.

    2015-01-01

    Data glitches are errors in a dataset. They are complex entities that often span multiple attributes and records. When they co-occur in data, the presence of one type of glitch can hinder the detection of another type of glitch. This phenomenon is called masking. In this paper, we define two important types of masking and propose a novel, statistically rigorous indicator called masking index for quantifying the hidden glitches. We outline four cases of masking: outliers masked by missing valu...

  20. Hidden twelve-dimensional super Poincare symmetry in eleven dimensions

    International Nuclear Information System (INIS)

    Bars, Itzhak; Deliduman, Cemsinan; Pasqua, Andrea; Zumino, Bruno

    2004-01-01

    First, we review a result in our previous paper, of how a ten-dimensional superparticle, taken off-shell, has a hidden eleven-dimensional super Poincare symmetry. Then, we show that the physical sector is defined by three first-class constraints which preserve the full eleven-dimensional symmetry. Applying the same concepts to the eleven-dimensional superparticle, taken off-shell, we discover a hidden twelve-dimensional super Poincare symmetry that governs the theory

  1. Hidden neural networks

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose; Riis, Søren Kamaric

    1999-01-01

    A general framework for hybrids of hidden Markov models (HMMs) and neural networks (NNs) called hidden neural networks (HNNs) is described. The article begins by reviewing standard HMMs and estimation by conditional maximum likelihood, which is used by the HNN. In the HNN, the usual HMM probability...... parameters are replaced by the outputs of state-specific neural networks. As opposed to many other hybrids, the HNN is normalized globally and therefore has a valid probabilistic interpretation. All parameters in the HNN are estimated simultaneously according to the discriminative conditional maximum...... likelihood criterion. The HNN can be viewed as an undirected probabilistic independence network (a graphical model), where the neural networks provide a compact representation of the clique functions. An evaluation of the HNN on the task of recognizing broad phoneme classes in the TIMIT database shows clear...

  2. Proposed optical test of Bell's inequalities not resting upon the fair sampling assumption

    International Nuclear Information System (INIS)

    Santos, Emilio

    2004-01-01

    Arguments are given against the fair sampling assumption, used to claim an empirical disproof of local realism. New tests are proposed, able to discriminate between quantum mechanics and a restricted, but appealing, family of local hidden-variables models. Such tests require detectors with efficiencies just above 20%

  3. A hidden history

    OpenAIRE

    Peppers, Emily

    2008-01-01

    The Cultural Collections Audit project began at the University of Edinburgh in 2004, searching for hidden treasures in its 'distributed heritage collections' across the university. The objects and collections recorded in the Audit ranged widely from fine art and furniture to historical scientific and teaching equipment and personalia relating to key figures in the university's long tradition of academic excellence. This information was gathered in order to create a central database of informa...

  4. Distinguishing Hidden Markov Chains

    OpenAIRE

    Kiefer, Stefan; Sistla, A. Prasad

    2015-01-01

    Hidden Markov Chains (HMCs) are commonly used mathematical models of probabilistic systems. They are employed in various fields such as speech recognition, signal processing, and biological sequence analysis. We consider the problem of distinguishing two given HMCs based on an observation sequence that one of the HMCs generates. More precisely, given two HMCs and an observation sequence, a distinguishing algorithm is expected to identify the HMC that generates the observation sequence. Two HM...

  5. Coupling of Hidden Sector

    OpenAIRE

    Królikowski, Wojciech

    2016-01-01

    A hypothetic Hidden Sector of the Universe, consisting of sterile fer\\-mions (``sterinos'') and sterile mediating bosons (``sterons'') of mass dimension 1 (not 2!) --- the last described by an antisymmetric tensor field --- requires to exist also a scalar isovector and scalar isoscalar in order to be able to construct electroweak invariant coupling (before spontaneously breaking its symmetry). The introduced scalar isoscalar might be a resonant source for the diphoton excess of 750 GeV, sugge...

  6. From the solar system fo hidden cosmic structures

    Energy Technology Data Exchange (ETDEWEB)

    Benes, K

    1987-01-01

    The development of experimental astrophysics showed that in the evolution of planets, natural processes of a common nature take place. They include, e.g., radiogenic heat, the production of magmas, volcanic activity, degassing, etc. The solar system is a cosmic formation in an advanced stage of development and it is a realistic assumption that in the Galaxy other hidden planetary systems in various stages of development exist. The views on the possibility of the origination of life in other systems differ; life, however, is seen as a hidden property of cosmic matter. (M.D.).

  7. Sampling Assumptions in Inductive Generalization

    Science.gov (United States)

    Navarro, Daniel J.; Dry, Matthew J.; Lee, Michael D.

    2012-01-01

    Inductive generalization, where people go beyond the data provided, is a basic cognitive capability, and it underpins theoretical accounts of learning, categorization, and decision making. To complete the inductive leap needed for generalization, people must make a key "sampling" assumption about how the available data were generated.…

  8. Major Assumptions of Mastery Learning.

    Science.gov (United States)

    Anderson, Lorin W.

    Mastery learning can be described as a set of group-based, individualized, teaching and learning strategies based on the premise that virtually all students can and will, in time, learn what the school has to teach. Inherent in this description are assumptions concerning the nature of schools, classroom instruction, and learners. According to the…

  9. Localization of hidden Chua's attractors

    International Nuclear Information System (INIS)

    Leonov, G.A.; Kuznetsov, N.V.; Vagaitsev, V.I.

    2011-01-01

    The classical attractors of Lorenz, Rossler, Chua, Chen, and other widely-known attractors are those excited from unstable equilibria. From computational point of view this allows one to use numerical method, in which after transient process a trajectory, started from a point of unstable manifold in the neighborhood of equilibrium, reaches an attractor and identifies it. However there are attractors of another type: hidden attractors, a basin of attraction of which does not contain neighborhoods of equilibria. In the present Letter for localization of hidden attractors of Chua's circuit it is suggested to use a special analytical-numerical algorithm. -- Highlights: → There are hidden attractors: basin doesn't contain neighborhoods of equilibria. → Hidden attractors cannot be reached by trajectory from neighborhoods of equilibria. → We suggested special procedure for localization of hidden attractors. → We discovered hidden attractor in Chua's system, L. Chua in his work didn't expect this.

  10. Hidden gauge structure of supersymmetric free differential algebras

    Energy Technology Data Exchange (ETDEWEB)

    Andrianopoli, Laura [DISAT, Politecnico di Torino,Corso Duca degli Abruzzi 24, I-10129 Turin (Italy); INFN - Sezione di Torino,Torino (Italy); D’Auria, Riccardo [DISAT, Politecnico di Torino,Corso Duca degli Abruzzi 24, I-10129 Turin (Italy); Ravera, Lucrezia [DISAT, Politecnico di Torino,Corso Duca degli Abruzzi 24, I-10129 Turin (Italy); INFN - Sezione di Torino,Torino (Italy)

    2016-08-16

    The aim of this paper is to clarify the role of the nilpotent fermionic generator Q{sup ′} introduced in http://dx.doi.org/10.1016/0550-3213(82)90376-5 and appearing in the hidden supergroup underlying the free differential algebra (FDA) of D=11 supergravity. We give a physical explanation of its role by looking at the gauge properties of the theory. We find that its presence is necessary, in order that the extra 1-forms of the hidden supergroup give rise to the correct gauge transformations of the p-forms of the FDA. This interpretation is actually valid for any supergravity containing antisymmetric tensor fields, and any supersymmetric FDA can always be traded for a hidden Lie superalgebra containing extra fermionic nilpotent generators. As an interesting example we construct the hidden superalgebra associated with the FDA of N=2, D=7 supergravity. In this case we are able to parametrize the mutually non local 2- and 3-form B{sup (2)} and B{sup (3)} in terms of hidden 1-forms and find that supersymmetry and gauge invariance require in general the presence of two nilpotent fermionic generators in the hidden algebra. We propose that our approach, where all the invariances of the FDA are expressed as Lie derivatives of the p-forms in the hidden supergroup manifold, could be an appropriate framework to discuss theories defined in enlarged versions of superspace recently considered in the literature, such us double field theory and its generalizations.

  11. Hidden Liquidity: Determinants and Impact

    OpenAIRE

    Gökhan Cebiroglu; Ulrich Horst

    2012-01-01

    We cross-sectionally analyze the presence of aggregated hidden depth and trade volume in the S&P 500 and identify its key determinants. We find that the spread is the main predictor for a stock’s hidden dimension, both in terms of traded and posted liquidity. Our findings moreover suggest that large hidden orders are associated with larger transaction costs, higher price impact and increased volatility. In particular, as large hidden orders fail to attract (latent) liquidity to the market, ...

  12. Hidden Risk Factors for Women

    Science.gov (United States)

    ... A.S.T. Quiz Hidden Stroke Risk Factors for Women Updated:Nov 22,2016 Excerpted from "What Women Need To Know About The Hidden Risk Factors ... 2012) This year, more than 100,000 U.S. women under 65 will have a stroke. Stroke is ...

  13. Higgs Portal into Hidden Sectors

    CERN Multimedia

    CERN. Geneva

    2007-01-01

    Several attractive theoretical ideas suggest the existence of one or more 'hidden sectors' consisting of standard model singlet fields, some of which may not be too heavy. There is a profound reason to think that the Higgs sector might provide the first access to these hidden sectors. This scenario could affect Higgs phenomenology in drastic ways.

  14. On testing the missing at random assumption

    DEFF Research Database (Denmark)

    Jaeger, Manfred

    2006-01-01

    Most approaches to learning from incomplete data are based on the assumption that unobserved values are missing at random (mar). While the mar assumption, as such, is not testable, it can become testable in the context of other distributional assumptions, e.g. the naive Bayes assumption...

  15. Beyond the crystal ball assumption

    DEFF Research Database (Denmark)

    Vaucouleur, Sebastien

    2008-01-01

    (programmers hide implementation details behind previously defined interfaces, or alternatively, they refine some pre-defined properties). While practical, this approach is unfortunately not completely satisfactory for Enterprise Resource Planning systems (ERPs). These software products have to be customizable...... quantification. We introduce the Eggther framework for customization of evolvable software products in general and ERP systems in particular. Our approach is based on the concept of code query by example. The technology being developed is based on an initial empirical study on practices around ERP systems. We...

  16. Hidden attractors in dynamical systems

    Science.gov (United States)

    Dudkowski, Dawid; Jafari, Sajad; Kapitaniak, Tomasz; Kuznetsov, Nikolay V.; Leonov, Gennady A.; Prasad, Awadhesh

    2016-06-01

    Complex dynamical systems, ranging from the climate, ecosystems to financial markets and engineering applications typically have many coexisting attractors. This property of the system is called multistability. The final state, i.e., the attractor on which the multistable system evolves strongly depends on the initial conditions. Additionally, such systems are very sensitive towards noise and system parameters so a sudden shift to a contrasting regime may occur. To understand the dynamics of these systems one has to identify all possible attractors and their basins of attraction. Recently, it has been shown that multistability is connected with the occurrence of unpredictable attractors which have been called hidden attractors. The basins of attraction of the hidden attractors do not touch unstable fixed points (if exists) and are located far away from such points. Numerical localization of the hidden attractors is not straightforward since there are no transient processes leading to them from the neighborhoods of unstable fixed points and one has to use the special analytical-numerical procedures. From the viewpoint of applications, the identification of hidden attractors is the major issue. The knowledge about the emergence and properties of hidden attractors can increase the likelihood that the system will remain on the most desirable attractor and reduce the risk of the sudden jump to undesired behavior. We review the most representative examples of hidden attractors, discuss their theoretical properties and experimental observations. We also describe numerical methods which allow identification of the hidden attractors.

  17. Detecting Structural Breaks using Hidden Markov Models

    DEFF Research Database (Denmark)

    Ntantamis, Christos

    Testing for structural breaks and identifying their location is essential for econometric modeling. In this paper, a Hidden Markov Model (HMM) approach is used in order to perform these tasks. Breaks are defined as the data points where the underlying Markov Chain switches from one state to another....... The estimation of the HMM is conducted using a variant of the Iterative Conditional Expectation-Generalized Mixture (ICE-GEMI) algorithm proposed by Delignon et al. (1997), that permits analysis of the conditional distributions of economic data and allows for different functional forms across regimes...

  18. Problems with Contingency Theory: Testing Assumptions Hidden within the Language of Contingency "Theory".

    Science.gov (United States)

    Schoonhoven, Clausia Bird

    1981-01-01

    Discusses problems in contingency theory, which relates organizational structure to the tasks performed and the information needed. Analysis of data from 17 hospitals suggests that traditional contingency theory underrepresents the complexity of relations among technological uncertainty, structure, and organizational effectiveness. (Author/RW)

  19. Hidden Losses: How Demographics Can Encourage Incorrect Assumptions about ESL High School Students' Success

    Science.gov (United States)

    Toohey, Kelleen; Derwing, Tracey M.

    2008-01-01

    Data from ESL students' records in Vancouver are examined in the light of the BC Ministry of Education's claim that ESL high school students are more successful than students whose first language is English. We argue that the academic achievement of well-to-do students whose parents are skilled workers or entrepreneurs may mask the completion…

  20. Variational Infinite Hidden Conditional Random Fields

    NARCIS (Netherlands)

    Bousmalis, Konstantinos; Zafeiriou, Stefanos; Morency, Louis-Philippe; Pantic, Maja; Ghahramani, Zoubin

    2015-01-01

    Hidden conditional random fields (HCRFs) are discriminative latent variable models which have been shown to successfully learn the hidden structure of a given classification problem. An Infinite hidden conditional random field is a hidden conditional random field with a countably infinite number of

  1. Managing Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Larsen, Marcus M.; Pedersen, Torben

    2014-01-01

    This chapter investigates the concept of the ‘hidden costs’ of offshoring, i.e. unexpected offshoring costs exceeding the initially expected costs. Due to the highly undefined nature of these costs, we position our analysis towards the strategic responses of firms’ realisation of hidden costs....... In this regard, we argue that a major response to the hidden costs of offshoring is the identification and utilisation of strategic mechanisms in the organisational design to eventually achieving system integration in a globally dispersed and disaggregated organisation. This is heavily moderated by a learning......-by-doing process, where hidden costs motivate firms and their employees to search for new and better knowledge on how to successfully manage the organisation. We illustrate this thesis based on the case of the LEGO Group....

  2. The Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Møller Larsen, Marcus; Manning, Stephan; Pedersen, Torben

    2011-01-01

    of offshoring. Specifically, we propose that hidden costs can be explained by the combination of increasing structural, operational and social complexity of offshoring activities. In addition, we suggest that firm orientation towards organizational design as part of an offshoring strategy and offshoring......This study seeks to explain hidden costs of offshoring, i.e. unexpected costs resulting from the relocation of business tasks and activities outside the home country. We develop a model that highlights the role of complexity, design orientation and experience in explaining hidden costs...... experience moderate the relationship between complexity and hidden costs negatively i.e. reduces the cost generating impact of complexity. We develop three hypotheses and test them on comprehensive data from the Offshoring Research Network (ORN). In general, we find support for our hypotheses. A key result...

  3. Child Abuse: The Hidden Bruises

    Science.gov (United States)

    ... for Families - Vietnamese Spanish Facts for Families Guide Child Abuse - The Hidden Bruises No. 5; Updated November 2014 The statistics on physical child abuse are alarming. It is estimated hundreds of thousands ...

  4. Assumptions and Policy Decisions for Vital Area Identification Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Myungsu; Bae, Yeon-Kyoung; Lee, Youngseung [KHNP CRI, Daejeon (Korea, Republic of)

    2016-10-15

    U.S. Nuclear Regulatory Commission and IAEA guidance indicate that certain assumptions and policy questions should be addressed to a Vital Area Identification (VAI) process. Korea Hydro and Nuclear Power conducted a VAI based on current Design Basis Threat and engineering judgement to identify APR1400 vital areas. Some of the assumptions were inherited from Probabilistic Safety Assessment (PSA) as a sabotage logic model was based on PSA logic tree and equipment location data. This paper illustrates some important assumptions and policy decisions for APR1400 VAI analysis. Assumptions and policy decisions could be overlooked at the beginning stage of VAI, however they should be carefully reviewed and discussed among engineers, plant operators, and regulators. Through APR1400 VAI process, some of the policy concerns and assumptions for analysis were applied based on document research and expert panel discussions. It was also found that there are more assumptions to define for further studies for other types of nuclear power plants. One of the assumptions is mission time, which was inherited from PSA.

  5. Hidden Statistics of Schroedinger Equation

    Science.gov (United States)

    Zak, Michail

    2011-01-01

    Work was carried out in determination of the mathematical origin of randomness in quantum mechanics and creating a hidden statistics of Schr dinger equation; i.e., to expose the transitional stochastic process as a "bridge" to the quantum world. The governing equations of hidden statistics would preserve such properties of quantum physics as superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods.

  6. Fair-sampling assumption is not necessary for testing local realism

    International Nuclear Information System (INIS)

    Berry, Dominic W.; Jeong, Hyunseok; Stobinska, Magdalena; Ralph, Timothy C.

    2010-01-01

    Almost all Bell inequality experiments to date have used postselection and therefore relied on the fair sampling assumption for their interpretation. The standard form of the fair sampling assumption is that the loss is independent of the measurement settings, so the ensemble of detected systems provides a fair statistical sample of the total ensemble. This is often assumed to be needed to interpret Bell inequality experiments as ruling out hidden-variable theories. Here we show that it is not necessary; the loss can depend on measurement settings, provided the detection efficiency factorizes as a function of the measurement settings and any hidden variable. This condition implies that Tsirelson's bound must be satisfied for entangled states. On the other hand, we show that it is possible for Tsirelson's bound to be violated while the Clauser-Horne-Shimony-Holt (CHSH)-Bell inequality still holds for unentangled states, and present an experimentally feasible example.

  7. Analysing the hidden curriculum: use of a cultural web.

    Science.gov (United States)

    Mossop, Liz; Dennick, Reg; Hammond, Richard; Robbé, Iain

    2013-02-01

    Major influences on learning about medical professionalism come from the hidden curriculum. These influences can contribute positively or negatively towards the professional enculturation of clinical students. The fact that there is no validated method for identifying the components of the hidden curriculum poses problems for educators considering professionalism. The aim of this study was to analyse whether a cultural web, adapted from a business context, might assist in the identification of elements of the hidden curriculum at a UK veterinary school. A qualitative approach was used. Seven focus groups consisting of three staff groups and four student groups were organised. Questioning was framed using the cultural web, which is a model used by business owners to assess their environment and consider how it affects their employees and customers. The focus group discussions were recorded, transcribed and analysed thematically using a combination of a priori and emergent themes. The cultural web identified elements of the hidden curriculum for both students and staff. These included: core assumptions; routines; rituals; control systems; organisational factors; power structures, and symbols. Discussions occurred about how and where these issues may affect students' professional identity development. The cultural web framework functioned well to help participants identify elements of the hidden curriculum. These aspects aligned broadly with previously described factors such as role models and institutional slang. The influence of these issues on a student's development of a professional identity requires discussion amongst faculty staff, and could be used to develop learning opportunities for students. The framework is promising for the analysis of the hidden curriculum and could be developed as an instrument for implementation in other clinical teaching environments. © Blackwell Publishing Ltd 2013.

  8. Implicity Defined Neural Networks for Sequence Labeling

    Science.gov (United States)

    2017-02-13

    assumption - that a hid- den variable changes its state based only on its current state and observables. In finding maximum likelihood state sequences...this setup, we have the following variables : data X labels Y parameters θ and functions: implicit hidden layer definition H = F (θ, ξ,H) loss function L...tagging task. In future work, we intend to consider implicit varia - tions of other archetectures, such as the LSTM, as well as additional, more challenging

  9. Hidden ion population: Revisited

    International Nuclear Information System (INIS)

    Olsen, R.C.; Chappell, C.R.; Gallagher, D.L.; Green, J.L.; Gurnett, D.A.

    1985-01-01

    Satellite potentials in the outer plasmasphere range from near zero to +5 to +10 V. Under such conditions ion measurements may not include the low energy core of the plasma population. In eclipse, the photoelectron current drops to zero, and the spacecraft potential can drop to near zero volts. In regions where the ambient plasma density is below 100 cm -3 , previously unobserved portions of the ambient plasma distribution function can become visible in eclipse. A survey of the data obtained from the retarding ion mass spectrometer (RIMS) on Dynamics Explorer 1 shows that the RIMS detector generally measured the isotropic background in both sunlight and eclipse in the plasma-sphere. Absolute density measurements for the ''hidden'' ion population are obtained for the first time using the plasma wave instrument observations of the upper hybrid resonance. Agreement in total density is found in sunlight and eclipse measurements at densities above 80 cm -3 . In eclipse, agreement is found at densities as low as 20 cm -3 . The isotropic plasma composition is primarily H + , with approx.10% He + , and 0.1 to 1.0% O + . A low energy field-aligned ion population appears in eclipse measurements outside the plasmasphere, which is obscured in sunlight. These field-aligned ions can be interpreted as field-aligned flows with densities of a few particles per cubic centimeter, flowing at 5-20 km/s. The problem in measuring these field-aligned flows in sunlight is the masking of the high energy tail of the field-aligned distribution by the isotropic background. Effective measurement of the core of the magnetospheric plasma distribution awaits satellites with active means of controlling the satellite potential

  10. Stargate of the Hidden Multiverse

    Directory of Open Access Journals (Sweden)

    Alexander Antonov

    2016-02-01

    Full Text Available Concept of Monoverse, which corresponds to the existing broad interpretation of the second postulate of the special theory of relativity, is not consistent with the modern astrophysical reality — existence of the dark matter and the dark energy, the total mass-energy of which is ten times greater than the mass-energy of the visible universe (which has been considered as the entire universe until very recent . This concept does not allow to explain their rather unusual properties — invisibility and lack of baryon content — which would seem to even destroy the very modern understanding of the term ‘matter’. However, all numerous alternative concepts of Multiverses, which have been proposed until today, are unable to explain these properties of the dark matter and dark energy. This article describes a new concept: the concept of the hidden Multiverse and hidden Supermultiverse, which mutual invisibility of parallel universes is explained by the physical reality of imaginary numbers. This concept completely explains the phenomenon of the dark matter and the dark energy. Moreover, it is shown that the dark matter and the dark energy are the experimental evidence for the existence of the hidden Multiverse. Described structure of the hidden Multiverse is fully consistent with the data obtained by the space stations WMAP and Planck. An extremely important property of the hidden Multiverse is an actual possibility of its permeation through stargate located on the Earth.

  11. Hidden photons in connection to dark matter

    Energy Technology Data Exchange (ETDEWEB)

    Andreas, Sarah; Ringwald, Andreas [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Goodsell, Mark D. [CPhT, Ecole Polytechnique, Palaiseau (France)

    2013-06-15

    Light extra U(1) gauge bosons, so called hidden photons, which reside in a hidden sector have attracted much attention since they are a well motivated feature of many scenarios beyond the Standard Model and furthermore could mediate the interaction with hidden sector dark matter.We review limits on hidden photons from past electron beam dump experiments including two new limits from such experiments at KEK and Orsay. In addition, we study the possibility of having dark matter in the hidden sector. A simple toy model and different supersymmetric realisations are shown to provide viable dark matter candidates in the hidden sector that are in agreement with recent direct detection limits.

  12. Hidden photons in connection to dark matter

    International Nuclear Information System (INIS)

    Andreas, Sarah; Ringwald, Andreas; Goodsell, Mark D.

    2013-06-01

    Light extra U(1) gauge bosons, so called hidden photons, which reside in a hidden sector have attracted much attention since they are a well motivated feature of many scenarios beyond the Standard Model and furthermore could mediate the interaction with hidden sector dark matter.We review limits on hidden photons from past electron beam dump experiments including two new limits from such experiments at KEK and Orsay. In addition, we study the possibility of having dark matter in the hidden sector. A simple toy model and different supersymmetric realisations are shown to provide viable dark matter candidates in the hidden sector that are in agreement with recent direct detection limits.

  13. Hidden solution to the μ/Bμ problem in gauge mediation

    International Nuclear Information System (INIS)

    Roy, Tuhin S.; Schmaltz, Martin

    2008-01-01

    We propose a solution to the μ/B μ problem in gauge mediation. The novel feature of our solution is that it uses dynamics of the hidden sector, which is often present in models with dynamical supersymmetry breaking. We give an explicit example model of gauge mediation where a very simple messenger sector generates both μ and B μ at one loop. The usual problem, that B μ is then too large, is solved by strong renormalization effects from the hidden sector which suppress B μ relative to μ. Our mechanism relies on an assumption about the signs of certain incalculable anomalous dimensions in the hidden sector. Making these assumptions not only allows us to solve the μ/B μ problem but also leads to a characteristic superpartner spectrum which would be a smoking gun signal for our mechanism.

  14. Optimal no-go theorem on hidden-variable predictions of effect expectations

    Science.gov (United States)

    Blass, Andreas; Gurevich, Yuri

    2018-03-01

    No-go theorems prove that, under reasonable assumptions, classical hidden-variable theories cannot reproduce the predictions of quantum mechanics. Traditional no-go theorems proved that hidden-variable theories cannot predict correctly the values of observables. Recent expectation no-go theorems prove that hidden-variable theories cannot predict the expectations of observables. We prove the strongest expectation-focused no-go theorem to date. It is optimal in the sense that the natural weakenings of the assumptions and the natural strengthenings of the conclusion make the theorem fail. The literature on expectation no-go theorems strongly suggests that the expectation-focused approach is more general than the value-focused one. We establish that the expectation approach is not more general.

  15. The Hidden STEM Economy

    Science.gov (United States)

    Rothwell, Jonathan

    2013-01-01

    Workers in STEM (science, technology, engineering, and math) fields play a direct role in driving economic growth. Yet, because of how the STEM economy has been defined, policymakers have mainly focused on supporting workers with at least a bachelor's (BA) degree, overlooking a strong potential workforce of those with less than a BA. This report…

  16. Hidden worlds in quantum physics

    CERN Document Server

    Gouesbet, Gérard

    2014-01-01

    The past decade has witnessed a resurgence in research and interest in the areas of quantum computation and entanglement. This new book addresses the hidden worlds or variables of quantum physics. Author Gérard Gouesbet studied and worked with a former student of Louis de Broglie, a pioneer of quantum physics. His presentation emphasizes the history and philosophical foundations of physics, areas that will interest lay readers as well as professionals and advanced undergraduate and graduate students of quantum physics. The introduction is succeeded by chapters offering background on relevant concepts in classical and quantum mechanics, a brief history of causal theories, and examinations of the double solution, pilot wave, and other hidden-variables theories. Additional topics include proofs of possibility and impossibility, contextuality, non-locality, classification of hidden-variables theories, and stochastic quantum mechanics. The final section discusses how to gain a genuine understanding of quantum mec...

  17. Detecting hidden particles with MATHUSLA

    Science.gov (United States)

    Evans, Jared A.

    2018-03-01

    A hidden sector containing light long-lived particles provides a well-motivated place to find new physics. The recently proposed MATHUSLA experiment has the potential to be extremely sensitive to light particles originating from rare meson decays in the very long lifetime region. In this work, we illustrate this strength with the specific example of a light scalar mixed with the standard model-like Higgs boson, a model where MATHUSLA can further probe unexplored parameter space from exotic Higgs decays. Design augmentations should be considered in order to maximize the ability of MATHUSLA to discover very light hidden sector particles.

  18. Hidden Crises and Communication: An Interactional Analysis of Hidden Crises

    NARCIS (Netherlands)

    dr. Annette Klarenbeek

    2011-01-01

    In this paper I describe the ways in which the communication discipline can make a hidden crisis transparent. For this purpose I examine the concept of crisis entrepreneurship from a communication point of view. Using discourse analysis, I analyse the discursive practices of crisis entrepreneurs in

  19. Hidden Crises and Communication : An Interactional Analysis of Hidden Crises

    NARCIS (Netherlands)

    dr. Annette Klarenbeek

    2011-01-01

    In this paper I describe the ways in which the communication discipline can make a hidden crisis transparent. For this purpose I examine the concept of crisis entrepreneurship from a communication point of view. Using discourse analysis, I analyse the discursive practices of crisis entrepreneurs in

  20. How Symmetrical Assumptions Advance Strategic Management Research

    DEFF Research Database (Denmark)

    Foss, Nicolai Juul; Hallberg, Hallberg

    2014-01-01

    We develop the case for symmetrical assumptions in strategic management theory. Assumptional symmetry obtains when assumptions made about certain actors and their interactions in one of the application domains of a theory are also made about this set of actors and their interactions in other...... application domains of the theory. We argue that assumptional symmetry leads to theoretical advancement by promoting the development of theory with greater falsifiability and stronger ontological grounding. Thus, strategic management theory may be advanced by systematically searching for asymmetrical...

  1. Evolution of Requirements and Assumptions for Future Exploration Missions

    Science.gov (United States)

    Anderson, Molly; Sargusingh, Miriam; Perry, Jay

    2017-01-01

    NASA programs are maturing technologies, systems, and architectures to enabling future exploration missions. To increase fidelity as technologies mature, developers must make assumptions that represent the requirements of a future program. Multiple efforts have begun to define these requirements, including team internal assumptions, planning system integration for early demonstrations, and discussions between international partners planning future collaborations. For many detailed life support system requirements, existing NASA documents set limits of acceptable values, but a future vehicle may be constrained in other ways, and select a limited range of conditions. Other requirements are effectively set by interfaces or operations, and may be different for the same technology depending on whether the hard-ware is a demonstration system on the International Space Station, or a critical component of a future vehicle. This paper highlights key assumptions representing potential life support requirements and explanations of the driving scenarios, constraints, or other issues that drive them.

  2. Define Project

    DEFF Research Database (Denmark)

    Munk-Madsen, Andreas

    2005-01-01

    "Project" is a key concept in IS management. The word is frequently used in textbooks and standards. Yet we seldom find a precise definition of the concept. This paper discusses how to define the concept of a project. The proposed definition covers both heavily formalized projects and informally...... organized, agile projects. Based on the proposed definition popular existing definitions are discussed....

  3. "Dermatitis" defined.

    Science.gov (United States)

    Smith, Suzanne M; Nedorost, Susan T

    2010-01-01

    The term "dermatitis" can be defined narrowly or broadly, clinically or histologically. A common and costly condition, dermatitis is underresourced compared to other chronic skin conditions. The lack of a collectively understood definition of dermatitis and its subcategories could be the primary barrier. To investigate how dermatologists define the term "dermatitis" and determine if a consensus on the definition of this term and other related terms exists. A seven-question survey of dermatologists nationwide was conducted. Of respondents (n  =  122), half consider dermatitis to be any inflammation of the skin. Nearly half (47.5%) use the term interchangeably with "eczema." Virtually all (> 96%) endorse the subcategory "atopic" under the terms "dermatitis" and "eczema," but the subcategories "contact," "drug hypersensitivity," and "occupational" are more highly endorsed under the term "dermatitis" than under the term "eczema." Over half (55.7%) personally consider "dermatitis" to have a broad meaning, and even more (62.3%) believe that dermatologists as a whole define the term broadly. There is a lack of consensus among experts in defining dermatitis, eczema, and their related subcategories.

  4. Entry deterrence and hidden competition

    NARCIS (Netherlands)

    Lavrutich, Maria; Huisman, Kuno; Kort, Peter

    This paper studies strategic investment behavior of firms facing an uncertain demand in a duopoly setting. Firms choose both investment timing and the capacity level while facing additional uncertainty about market participants, which is introduced via the concept of hidden competition. We focus on

  5. Adaptive Partially Hidden Markov Models

    DEFF Research Database (Denmark)

    Forchhammer, Søren Otto; Rasmussen, Tage

    1996-01-01

    Partially Hidden Markov Models (PHMM) have recently been introduced. The transition and emission probabilities are conditioned on the past. In this report, the PHMM is extended with a multiple token version. The different versions of the PHMM are applied to bi-level image coding....

  6. The Hidden Dimensions of Databases.

    Science.gov (United States)

    Jacso, Peter

    1994-01-01

    Discusses methods of evaluating commercial online databases and provides examples that illustrate their hidden dimensions. Topics addressed include size, including the number of records or the number of titles; the number of years covered; and the frequency of updates. Comparisons of Readers' Guide Abstracts and Magazine Article Summaries are…

  7. Wrong assumptions in the financial crisis

    NARCIS (Netherlands)

    Aalbers, M.B.

    2009-01-01

    Purpose - The purpose of this paper is to show how some of the assumptions about the current financial crisis are wrong because they misunderstand what takes place in the mortgage market. Design/methodology/approach - The paper discusses four wrong assumptions: one related to regulation, one to

  8. The relevance of ''theory rich'' bridge assumptions

    NARCIS (Netherlands)

    Lindenberg, S

    1996-01-01

    Actor models are increasingly being used as a form of theory building in sociology because they can better represent the caul mechanisms that connect macro variables. However, actor models need additional assumptions, especially so-called bridge assumptions, for filling in the relatively empty

  9. APPLICATION OF HIDDEN MARKOV CHAINS IN QUALITY CONTROL

    Directory of Open Access Journals (Sweden)

    Hanife DEMIRALP

    2013-01-01

    Full Text Available The ever growing technological innovations and sophistication in industrial processes require adequate checks on quality. Thus, there is an increasing demand for simple and efficient quality control methods. In this regard the control charts stand out in simplicity and efficiency. In this paper, we propose a method of controlling quality based on the theory of hidden Markov chains. Based on samples drawn at different times from the production process, the method obtains the state of the process probabilistically. The main advantage of the method is that it requires no assumption on the normality of the process output.

  10. Uncovering the Hidden Transaction Costs of Market Power

    DEFF Research Database (Denmark)

    Foss, Kirsten; Foss, Nicolai J.; Klein, Peter G.

    2018-01-01

    A central construct in competitive strategy research is market power, the ability to raise price above marginal cost. Positioning research focuses on attempts to build, protect, and exercise market power. However, this approach contains hidden assumptions about transaction costs. Parties made worse...... off by the exercise of market power can negotiate, bargain, form coalitions, and otherwise contract around the focal firm's attempts to appropriate monopoly profits—depending on transaction costs. We build on property rights economics to explain how transaction costs affect positioning and offer...

  11. Raising awareness of the hidden curriculum in veterinary medical education: a review and call for research.

    Science.gov (United States)

    Whitcomb, Tiffany L

    2014-01-01

    The hidden curriculum is characterized by information that is tacitly conveyed to and among students about the cultural and moral environment in which they find themselves. Although the hidden curriculum is often defined as a distinct entity, tacit information is conveyed to students throughout all aspects of formal and informal curricula. This unconsciously communicated knowledge has been identified across a wide spectrum of educational environments and is known to have lasting and powerful impacts, both positive and negative. Recently, medical education research on the hidden curriculum of becoming a doctor has come to the forefront as institutions struggle with inconsistencies between formal and hidden curricula that hinder the practice of patient-centered medicine. Similarly, the complex ethical questions that arise during the practice and teaching of veterinary medicine have the potential to cause disagreement between what the institution sets out to teach and what is actually learned. However, the hidden curriculum remains largely unexplored for this field. Because the hidden curriculum is retained effectively by students, elucidating its underlying messages can be a key component of program refinement. A review of recent literature about the hidden curriculum in a variety of fields, including medical education, will be used to explore potential hidden curricula in veterinary medicine and draw attention to the need for further investigation.

  12. Linear regression and the normality assumption.

    Science.gov (United States)

    Schmidt, Amand F; Finan, Chris

    2017-12-16

    Researchers often perform arbitrary outcome transformations to fulfill the normality assumption of a linear regression model. This commentary explains and illustrates that in large data settings, such transformations are often unnecessary, and worse may bias model estimates. Linear regression assumptions are illustrated using simulated data and an empirical example on the relation between time since type 2 diabetes diagnosis and glycated hemoglobin levels. Simulation results were evaluated on coverage; i.e., the number of times the 95% confidence interval included the true slope coefficient. Although outcome transformations bias point estimates, violations of the normality assumption in linear regression analyses do not. The normality assumption is necessary to unbiasedly estimate standard errors, and hence confidence intervals and P-values. However, in large sample sizes (e.g., where the number of observations per variable is >10) violations of this normality assumption often do not noticeably impact results. Contrary to this, assumptions on, the parametric model, absence of extreme observations, homoscedasticity, and independency of the errors, remain influential even in large sample size settings. Given that modern healthcare research typically includes thousands of subjects focusing on the normality assumption is often unnecessary, does not guarantee valid results, and worse may bias estimates due to the practice of outcome transformations. Copyright © 2017 Elsevier Inc. All rights reserved.

  13. Defining chaos.

    Science.gov (United States)

    Hunt, Brian R; Ott, Edward

    2015-09-01

    In this paper, we propose, discuss, and illustrate a computationally feasible definition of chaos which can be applied very generally to situations that are commonly encountered, including attractors, repellers, and non-periodically forced systems. This definition is based on an entropy-like quantity, which we call "expansion entropy," and we define chaos as occurring when this quantity is positive. We relate and compare expansion entropy to the well-known concept of topological entropy to which it is equivalent under appropriate conditions. We also present example illustrations, discuss computational implementations, and point out issues arising from attempts at giving definitions of chaos that are not entropy-based.

  14. Defining Cyberbullying.

    Science.gov (United States)

    Englander, Elizabeth; Donnerstein, Edward; Kowalski, Robin; Lin, Carolyn A; Parti, Katalin

    2017-11-01

    Is cyberbullying essentially the same as bullying, or is it a qualitatively different activity? The lack of a consensual, nuanced definition has limited the field's ability to examine these issues. Evidence suggests that being a perpetrator of one is related to being a perpetrator of the other; furthermore, strong relationships can also be noted between being a victim of either type of attack. It also seems that both types of social cruelty have a psychological impact, although the effects of being cyberbullied may be worse than those of being bullied in a traditional sense (evidence here is by no means definitive). A complicating factor is that the 3 characteristics that define bullying (intent, repetition, and power imbalance) do not always translate well into digital behaviors. Qualities specific to digital environments often render cyberbullying and bullying different in circumstances, motivations, and outcomes. To make significant progress in addressing cyberbullying, certain key research questions need to be addressed. These are as follows: How can we define, distinguish between, and understand the nature of cyberbullying and other forms of digital conflict and cruelty, including online harassment and sexual harassment? Once we have a functional taxonomy of the different types of digital cruelty, what are the short- and long-term effects of exposure to or participation in these social behaviors? What are the idiosyncratic characteristics of digital communication that users can be taught? Finally, how can we apply this information to develop and evaluate effective prevention programs? Copyright © 2017 by the American Academy of Pediatrics.

  15. A Hidden Twelve-Dimensional SuperPoincare Symmetry In Eleven Dimensions

    Energy Technology Data Exchange (ETDEWEB)

    Bars, Itzhak; Deliduman, Cemsinan; Pasqua, Andrea; Zumino, Bruno

    2003-12-13

    First, we review a result in our previous paper, of how a ten-dimensional superparticle, taken off-shell, has a hidden eleven-dimensional superPoincare symmetry. Then, we show that the physical sector is defined by three first-class constraints which preserve the full eleven-dimensional symmetry. Applying the same concepts to the eleven dimensional superparticle, taken off-shell, we discover a hidden twelve dimensional superPoincare symmetry that governs the theory.

  16. On the hidden maxwell superalgebra underlying D = 4 supergravity

    Energy Technology Data Exchange (ETDEWEB)

    Penafiel, D.M. [Departamento de Fisica, Universidad de Concepcion (Chile); DISAT, Politecnico di Torino (Italy); Istituto Nazionale di Fisica Nucleare (INFN), Sezione di Torino (Italy); Ravera, L. [DISAT, Politecnico di Torino (Italy); Istituto Nazionale di Fisica Nucleare (INFN), Sezione di Torino (Italy)

    2017-09-15

    In this work, we expand the hidden AdS-Lorentz superalgebra underlying D = 4 supergravity, reaching a (hidden) Maxwell superalgebra. The latter can be viewed as an extension involving cosmological constant of the superalgebra underlying D = 4 supergravity in flat spacetime. We write the Maurer-Cartan equations in this context and we find some interesting extensions of the antisymmetric 3-form A{sup (3)} appearing in the Free Differential Algebra in Minkowski space. The structure of Free Differential Algebras is obtained by considering the zero curvature equations. We write the parametrization of A{sup (3)} in terms of 1-forms and we rend the topological features of its extensions manifest. We interestingly find out that the structure of these extensions, and consequently the structure of the corresponding boundary contribution dA{sup (3)}, strongly depends on the form of the extra fermionic generator appearing in the hidden Maxwell superalgebra. The model we develop in this work is defined in an enlarged superspace with respect to the ordinary one, and the extra bosonic and fermionic 1-forms required for the closure of the hidden Maxwell superalgebra must be considered as physical fields in this enlarged superspace. (copyright 2017 WILEY-VCH Verlag GmbH and Co. KGaA, Weinheim)

  17. Hidden supersymmetry and large N

    International Nuclear Information System (INIS)

    Alfaro, J.

    1988-01-01

    In this paper we present a new method to deal with the leading order in the large-N expansion of a quantum field theory. The method uses explicitly the hidden supersymmetry that is present in the path-integral formulation of a stochastic process. In addition to this we derive a new relation that is valid in the leading order of the large-N expansion of the hermitian-matrix model for any spacetime dimension. (orig.)

  18. Formalization and Analysis of Reasoning by Assumption

    OpenAIRE

    Bosse, T.; Jonker, C.M.; Treur, J.

    2006-01-01

    This article introduces a novel approach for the analysis of the dynamics of reasoning processes and explores its applicability for the reasoning pattern called reasoning by assumption. More specifically, for a case study in the domain of a Master Mind game, it is shown how empirical human reasoning traces can be formalized and automatically analyzed against dynamic properties they fulfill. To this end, for the pattern of reasoning by assumption a variety of dynamic properties have been speci...

  19. Monitoring Assumptions in Assume-Guarantee Contracts

    Directory of Open Access Journals (Sweden)

    Oleg Sokolsky

    2016-05-01

    Full Text Available Pre-deployment verification of software components with respect to behavioral specifications in the assume-guarantee form does not, in general, guarantee absence of errors at run time. This is because assumptions about the environment cannot be discharged until the environment is fixed. An intuitive approach is to complement pre-deployment verification of guarantees, up to the assumptions, with post-deployment monitoring of environment behavior to check that the assumptions are satisfied at run time. Such a monitor is typically implemented by instrumenting the application code of the component. An additional challenge for the monitoring step is that environment behaviors are typically obtained through an I/O library, which may alter the component's view of the input format. This transformation requires us to introduce a second pre-deployment verification step to ensure that alarms raised by the monitor would indeed correspond to violations of the environment assumptions. In this paper, we describe an approach for constructing monitors and verifying them against the component assumption. We also discuss limitations of instrumentation-based monitoring and potential ways to overcome it.

  20. Hidden particle production at the ILC

    International Nuclear Information System (INIS)

    Fujii, Keisuke; Itoh, Hideo; Okada, Nobuchika; Hano, Hitoshi; Yoshioka, Tamaki

    2008-01-01

    In a class of new physics models, the new physics sector is completely or partly hidden, namely, a singlet under the standard model (SM) gauge group. Hidden fields included in such new physics models communicate with the standard model sector through higher-dimensional operators. If a cutoff lies in the TeV range, such hidden fields can be produced at future colliders. We consider a scalar field as an example of the hidden fields. Collider phenomenology on this hidden scalar is similar to that of the SM Higgs boson, but there are several features quite different from those of the Higgs boson. We investigate productions of the hidden scalar at the International Linear Collider (ILC) and study the feasibility of its measurements, in particular, how well the ILC distinguishes the scalar from the Higgs boson, through realistic Monte Carlo simulations.

  1. WIMPless dark matter from non-Abelian hidden sectors with anomaly-mediated supersymmetry breaking

    International Nuclear Information System (INIS)

    Feng, Jonathan L.; Shadmi, Yael

    2011-01-01

    In anomaly-mediated supersymmetry breaking models, superpartner masses are proportional to couplings squared. Their hidden sectors therefore naturally contain WIMPless dark matter, particles whose thermal relic abundance is guaranteed to be of the correct size, even though they are not weakly interacting massive particles. We study viable dark matter candidates in WIMPless anomaly-mediated supersymmetry breaking models with non-Abelian hidden sectors and highlight unusual possibilities that emerge in even the simplest models. In one example with a pure SU(N) hidden sector, stable hidden gluinos freeze out with the correct relic density, but have an extremely low, but natural, confinement scale, providing a framework for self-interacting dark matter. In another simple scenario, hidden gluinos freeze out and decay to visible Winos with the correct relic density, and hidden glueballs may either be stable, providing a natural framework for mixed cold-hot dark matter, or may decay, yielding astrophysical signals. Last, we present a model with light hidden pions that may be tested with improved constraints on the number of nonrelativistic degrees of freedom. All of these scenarios are defined by a small number of parameters, are consistent with gauge coupling unification, preserve the beautiful connection between the weak scale and the observed dark matter relic density, and are natural, with relatively light visible superpartners. We conclude with comments on interesting future directions.

  2. Formalization and analysis of reasoning by assumption.

    Science.gov (United States)

    Bosse, Tibor; Jonker, Catholijn M; Treur, Jan

    2006-01-02

    This article introduces a novel approach for the analysis of the dynamics of reasoning processes and explores its applicability for the reasoning pattern called reasoning by assumption. More specifically, for a case study in the domain of a Master Mind game, it is shown how empirical human reasoning traces can be formalized and automatically analyzed against dynamic properties they fulfill. To this end, for the pattern of reasoning by assumption a variety of dynamic properties have been specified, some of which are considered characteristic for the reasoning pattern, whereas some other properties can be used to discriminate among different approaches to the reasoning. These properties have been automatically checked for the traces acquired in experiments undertaken. The approach turned out to be beneficial from two perspectives. First, checking characteristic properties contributes to the empirical validation of a theory on reasoning by assumption. Second, checking discriminating properties allows the analyst to identify different classes of human reasoners. 2006 Lawrence Erlbaum Associates, Inc.

  3. Hidden measurements, hidden variables and the volume representation of transition probabilities

    OpenAIRE

    Oliynyk, Todd A.

    2005-01-01

    We construct, for any finite dimension $n$, a new hidden measurement model for quantum mechanics based on representing quantum transition probabilities by the volume of regions in projective Hilbert space. For $n=2$ our model is equivalent to the Aerts sphere model and serves as a generalization of it for dimensions $n \\geq 3$. We also show how to construct a hidden variables scheme based on hidden measurements and we discuss how joint distributions arise in our hidden variables scheme and th...

  4. Dissipative hidden sector dark matter

    Science.gov (United States)

    Foot, R.; Vagnozzi, S.

    2015-01-01

    A simple way of explaining dark matter without modifying known Standard Model physics is to require the existence of a hidden (dark) sector, which interacts with the visible one predominantly via gravity. We consider a hidden sector containing two stable particles charged under an unbroken U (1 )' gauge symmetry, hence featuring dissipative interactions. The massless gauge field associated with this symmetry, the dark photon, can interact via kinetic mixing with the ordinary photon. In fact, such an interaction of strength ε ˜10-9 appears to be necessary in order to explain galactic structure. We calculate the effect of this new physics on big bang nucleosynthesis and its contribution to the relativistic energy density at hydrogen recombination. We then examine the process of dark recombination, during which neutral dark states are formed, which is important for large-scale structure formation. Galactic structure is considered next, focusing on spiral and irregular galaxies. For these galaxies we modeled the dark matter halo (at the current epoch) as a dissipative plasma of dark matter particles, where the energy lost due to dissipation is compensated by the energy produced from ordinary supernovae (the core-collapse energy is transferred to the hidden sector via kinetic mixing induced processes in the supernova core). We find that such a dynamical halo model can reproduce several observed features of disk galaxies, including the cored density profile and the Tully-Fisher relation. We also discuss how elliptical and dwarf spheroidal galaxies could fit into this picture. Finally, these analyses are combined to set bounds on the parameter space of our model, which can serve as a guideline for future experimental searches.

  5. The homogeneous marginal utility of income assumption

    NARCIS (Netherlands)

    Demuynck, T.

    2015-01-01

    We develop a test to verify if every agent from a population of heterogeneous consumers has the same marginal utility of income function. This homogeneous marginal utility of income assumption is often (implicitly) used in applied demand studies because it has nice aggregation properties and

  6. Causal Mediation Analysis: Warning! Assumptions Ahead

    Science.gov (United States)

    Keele, Luke

    2015-01-01

    In policy evaluations, interest may focus on why a particular treatment works. One tool for understanding why treatments work is causal mediation analysis. In this essay, I focus on the assumptions needed to estimate mediation effects. I show that there is no "gold standard" method for the identification of causal mediation effects. In…

  7. Critically Challenging Some Assumptions in HRD

    Science.gov (United States)

    O'Donnell, David; McGuire, David; Cross, Christine

    2006-01-01

    This paper sets out to critically challenge five interrelated assumptions prominent in the (human resource development) HRD literature. These relate to: the exploitation of labour in enhancing shareholder value; the view that employees are co-contributors to and co-recipients of HRD benefits; the distinction between HRD and human resource…

  8. Formalization and Analysis of Reasoning by Assumption

    NARCIS (Netherlands)

    Bosse, T.; Jonker, C.M.; Treur, J.

    2006-01-01

    This article introduces a novel approach for the analysis of the dynamics of reasoning processes and explores its applicability for the reasoning pattern called reasoning by assumption. More specifically, for a case study in the domain of a Master Mind game, it is shown how empirical human reasoning

  9. Extracurricular Business Planning Competitions: Challenging the Assumptions

    Science.gov (United States)

    Watson, Kayleigh; McGowan, Pauric; Smith, Paul

    2014-01-01

    Business planning competitions [BPCs] are a commonly offered yet under-examined extracurricular activity. Given the extent of sceptical comment about business planning, this paper offers what the authors believe is a much-needed critical discussion of the assumptions that underpin the provision of such competitions. In doing so it is suggested…

  10. Shattering world assumptions: A prospective view of the impact of adverse events on world assumptions.

    Science.gov (United States)

    Schuler, Eric R; Boals, Adriel

    2016-05-01

    Shattered Assumptions theory (Janoff-Bulman, 1992) posits that experiencing a traumatic event has the potential to diminish the degree of optimism in the assumptions of the world (assumptive world), which could lead to the development of posttraumatic stress disorder. Prior research assessed the assumptive world with a measure that was recently reported to have poor psychometric properties (Kaler et al., 2008). The current study had 3 aims: (a) to assess the psychometric properties of a recently developed measure of the assumptive world, (b) to retrospectively examine how prior adverse events affected the optimism of the assumptive world, and (c) to measure the impact of an intervening adverse event. An 8-week prospective design with a college sample (N = 882 at Time 1 and N = 511 at Time 2) was used to assess the study objectives. We split adverse events into those that were objectively or subjectively traumatic in nature. The new measure exhibited adequate psychometric properties. The report of a prior objective or subjective trauma at Time 1 was related to a less optimistic assumptive world. Furthermore, participants who experienced an intervening objectively traumatic event evidenced a decrease in optimistic views of the world compared with those who did not experience an intervening adverse event. We found support for Shattered Assumptions theory retrospectively and prospectively using a reliable measure of the assumptive world. We discuss future assessments of the measure of the assumptive world and clinical implications to help rebuild the assumptive world with current therapies. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  11. Hidden inventory and safety considerations

    International Nuclear Information System (INIS)

    Anderson, A.R.; James, R.H.; Morgan, F.

    1976-01-01

    Preliminary results are described of the evaluation of residual plutonium in a process line used for the production of experimental fast reactor fuel. Initial attention has been focussed on a selection of work boxes used for processing powders and solutions. Amounts of material measured as ''hidden inventory'' are generally less than 0.1 percent of throughput but in one box containing very complex equipment the amount was exceptionally about 0.5 percent. The total surface area of the box and the installed equipment appears to be the most significant factor in determining the amount of plutonium held-up as ''hidden inventory,'' representing an average of about 4 x 10 -4 g cm -2 . Present results are based on gamma spectrometer measurements but neutron techniques are being developed to overcome some of the inherent uncertainties in the gamma method. It is suggested that the routine use of sample plates of known surface area would be valuable in monitoring the deposition of plutonium in work boxes

  12. Hidden costs of nuclear power

    International Nuclear Information System (INIS)

    England, R.W.

    1979-01-01

    Mr. England contends that these hidden costs add up to a figure much higher than those that appear in the electric utilities' profit and loss account - costs that are borne by Federal taxpayers, by nuclear industry workers, and by all those people who must share their environment with nuclear facilities. Costs he details are additional deaths and illnesses resulting from exposure to radiation, and the use of tax dollars to clean up the lethal garbage produced by those activities. He asserts that careless handling of uranium ore and mill tailings in past years has apparently resulted in serious public health problems in those mining communities. In another example, Mr. England states that the failure to isolate uranium tailings physically from their environment has probably contributed to an acute leukemia rate in Mesa County, Colorado. He mentions much of the technology development for power reactors being done by the Federal government, not by private reactor manufacturers - thus, again, hidden costs that do not show up in electric bills of customers. The back end of the nuclear fuel cycle as a place for Federally subsidized research and development is discussed briefly. 1 figure, 2 tables

  13. 26 CFR 1.752-6 - Partnership assumption of partner's section 358(h)(3) liability after October 18, 1999, and...

    Science.gov (United States)

    2010-04-01

    ... general. If, in a transaction described in section 721(a), a partnership assumes a liability (defined in...) does not apply to an assumption of a liability (defined in section 358(h)(3)) by a partnership as part... 26 Internal Revenue 8 2010-04-01 2010-04-01 false Partnership assumption of partner's section 358...

  14. Hidden neural networks: application to speech recognition

    DEFF Research Database (Denmark)

    Riis, Søren Kamaric

    1998-01-01

    We evaluate the hidden neural network HMM/NN hybrid on two speech recognition benchmark tasks; (1) task independent isolated word recognition on the Phonebook database, and (2) recognition of broad phoneme classes in continuous speech from the TIMIT database. It is shown how hidden neural networks...

  15. Insight: Exploring Hidden Roles in Collaborative Play

    Directory of Open Access Journals (Sweden)

    Tricia Shi

    2015-06-01

    Full Text Available This paper looks into interaction modes between players in co-located, collaborative games. In particular, hidden traitor games, in which one or more players is secretly working against the group mission, has the effect of increasing paranoia and distrust between players, so this paper looks into the opposite of a hidden traitor – a hidden benefactor. Rather than sabotaging the group mission, the hidden benefactor would help the group achieve the end goal while still having a reason to stay hidden. The paper explores what games with such a role can look like and how the role changes player interactions. Finally, the paper addresses the divide between video game and board game interaction modes; hidden roles are not common within video games, but they are of growing prevalence in board games. This fact, combined with the exploration of hidden benefactors, reveals that hidden roles is a mechanic that video games should develop into in order to match board games’ complexity of player interaction modes.

  16. Hidden supersymmetry and Fermion number fractionalization

    International Nuclear Information System (INIS)

    Akhoury, R.

    1985-01-01

    This paper discusses how a hidden supersymmetry of the underlying field theories can be used to interpret and to calculate fermion number fractionalization in different dimensions. This is made possible by relating it to a corresponding Witten index of the hidden supersymmetry. The closely related anomalies in odd dimensions are also discussed

  17. Towards New Probabilistic Assumptions in Business Intelligence

    OpenAIRE

    Schumann Andrew; Szelc Andrzej

    2015-01-01

    One of the main assumptions of mathematical tools in science is represented by the idea of measurability and additivity of reality. For discovering the physical universe additive measures such as mass, force, energy, temperature, etc. are used. Economics and conventional business intelligence try to continue this empiricist tradition and in statistical and econometric tools they appeal only to the measurable aspects of reality. However, a lot of important variables of economic systems cannot ...

  18. The 'revealed preferences' theory: Assumptions and conjectures

    International Nuclear Information System (INIS)

    Green, C.H.

    1983-01-01

    Being kind of intuitive psychology the 'Revealed-Preferences'- theory based approaches towards determining the acceptable risks are a useful method for the generation of hypotheses. In view of the fact that reliability engineering develops faster than methods for the determination of reliability aims the Revealed-Preferences approach is a necessary preliminary help. Some of the assumptions on which the 'Revealed-Preferences' theory is based will be identified and analysed and afterwards compared with experimentally obtained results. (orig./DG) [de

  19. How to Handle Assumptions in Synthesis

    Directory of Open Access Journals (Sweden)

    Roderick Bloem

    2014-07-01

    Full Text Available The increased interest in reactive synthesis over the last decade has led to many improved solutions but also to many new questions. In this paper, we discuss the question of how to deal with assumptions on environment behavior. We present four goals that we think should be met and review several different possibilities that have been proposed. We argue that each of them falls short in at least one aspect.

  20. Managerial and Organizational Assumptions in the CMM's

    DEFF Research Database (Denmark)

    Rose, Jeremy; Aaen, Ivan; Nielsen, Peter Axel

    2008-01-01

    Thinking about improving the management of software development in software firms is dominated by one approach: the capability maturity model devised and administered at the Software Engineering Institute at Carnegie Mellon University. Though CMM, and its replacement CMMI are widely known and used...... thinking about large production and manufacturing organisations (particularly in America) in the late industrial age. Many of the difficulties reported with CMMI can be attributed basing practice on these assumptions in organisations which have different cultures and management traditions, perhaps...

  1. Hidden scale invariance of metals

    DEFF Research Database (Denmark)

    Hummel, Felix; Kresse, Georg; Dyre, Jeppe C.

    2015-01-01

    Density functional theory (DFT) calculations of 58 liquid elements at their triple point show that most metals exhibit near proportionality between the thermal fluctuations of the virial and the potential energy in the isochoric ensemble. This demonstrates a general “hidden” scale invariance...... of metals making the condensed part of the thermodynamic phase diagram effectively one dimensional with respect to structure and dynamics. DFT computed density scaling exponents, related to the Grüneisen parameter, are in good agreement with experimental values for the 16 elements where reliable data were...... available. Hidden scale invariance is demonstrated in detail for magnesium by showing invariance of structure and dynamics. Computed melting curves of period three metals follow curves with invariance (isomorphs). The experimental structure factor of magnesium is predicted by assuming scale invariant...

  2. Hidden Valley Search at ATLAS

    CERN Document Server

    Verducci, M

    2011-01-01

    A number of extensions of the Standard Model result in neutral and weakly-coupled particles that decay to multi hadrons or multi leptons with macroscopic decay lengths. These particles with decay paths that can be comparable with ATLAS detector dimensions represent, from an experimental point of view, a challenge both for the trigger and for the reconstruction capabilities of the ATLAS detector. We will present a set of signature driven triggers for the ATLAS detector that target such displaced decays and evaluate their performances for some benchmark models and describe analysis strategies and limits on the production of such long-lived particles. A first estimation of the Hidden Valley trigger rates has been evaluated with 6 pb-1 of data collected at ATLAS during the data taking of 2010.

  3. Occupancy estimation and the closure assumption

    Science.gov (United States)

    Rota, Christopher T.; Fletcher, Robert J.; Dorazio, Robert M.; Betts, Matthew G.

    2009-01-01

    1. Recent advances in occupancy estimation that adjust for imperfect detection have provided substantial improvements over traditional approaches and are receiving considerable use in applied ecology. To estimate and adjust for detectability, occupancy modelling requires multiple surveys at a site and requires the assumption of 'closure' between surveys, i.e. no changes in occupancy between surveys. Violations of this assumption could bias parameter estimates; however, little work has assessed model sensitivity to violations of this assumption or how commonly such violations occur in nature. 2. We apply a modelling procedure that can test for closure to two avian point-count data sets in Montana and New Hampshire, USA, that exemplify time-scales at which closure is often assumed. These data sets illustrate different sampling designs that allow testing for closure but are currently rarely employed in field investigations. Using a simulation study, we then evaluate the sensitivity of parameter estimates to changes in site occupancy and evaluate a power analysis developed for sampling designs that is aimed at limiting the likelihood of closure. 3. Application of our approach to point-count data indicates that habitats may frequently be open to changes in site occupancy at time-scales typical of many occupancy investigations, with 71% and 100% of species investigated in Montana and New Hampshire respectively, showing violation of closure across time periods of 3 weeks and 8 days respectively. 4. Simulations suggest that models assuming closure are sensitive to changes in occupancy. Power analyses further suggest that the modelling procedure we apply can effectively test for closure. 5. Synthesis and applications. Our demonstration that sites may be open to changes in site occupancy over time-scales typical of many occupancy investigations, combined with the sensitivity of models to violations of the closure assumption, highlights the importance of properly addressing

  4. Hidden Markov models in automatic speech recognition

    Science.gov (United States)

    Wrzoskowicz, Adam

    1993-11-01

    This article describes a method for constructing an automatic speech recognition system based on hidden Markov models (HMMs). The author discusses the basic concepts of HMM theory and the application of these models to the analysis and recognition of speech signals. The author provides algorithms which make it possible to train the ASR system and recognize signals on the basis of distinct stochastic models of selected speech sound classes. The author describes the specific components of the system and the procedures used to model and recognize speech. The author discusses problems associated with the choice of optimal signal detection and parameterization characteristics and their effect on the performance of the system. The author presents different options for the choice of speech signal segments and their consequences for the ASR process. The author gives special attention to the use of lexical, syntactic, and semantic information for the purpose of improving the quality and efficiency of the system. The author also describes an ASR system developed by the Speech Acoustics Laboratory of the IBPT PAS. The author discusses the results of experiments on the effect of noise on the performance of the ASR system and describes methods of constructing HMM's designed to operate in a noisy environment. The author also describes a language for human-robot communications which was defined as a complex multilevel network from an HMM model of speech sounds geared towards Polish inflections. The author also added mandatory lexical and syntactic rules to the system for its communications vocabulary.

  5. Becoming a Hidden Champion: From Selective use of Customer Intimacy and Product Leadership to Business Attractiveness

    Directory of Open Access Journals (Sweden)

    Balas Rant Melita

    2017-04-01

    Full Text Available This paper sheds light on factors that support SMEs becoming market leaders on an international scale. Specifically, it studies the hidden champion type of companies, defined as SMEs that hold market leadership in narrow business segments on a regional or wider international scale. The market positioning of hidden champions is defined subjectively by CEOs in such a way that they create a high level of business attractiveness. This explorative study reveals that product leadership and customer intimacy are two blocks that build the business attractiveness of hidden champions. More specifically, the study on data from 93 niche leaders from Central and Eastern Europe showed that product leadership negatively moderates the business attractiveness-performance relationship, while the impact of the combination of product leadership and customer intimacy on the business attractiveness-firm performance relationship is not straightforward and depends on different combinations of these values.

  6. A survey of hidden-variables theories

    CERN Document Server

    Belinfante, F J

    1973-01-01

    A Survey of Hidden-Variables Theories is a three-part book on the hidden-variable theories, referred in this book as """"theories of the first kind"""". Part I reviews the motives in developing different types of hidden-variables theories. The quest for determinism led to theories of the first kind; the quest for theories that look like causal theories when applied to spatially separated systems that interacted in the past led to theories of the second kind. Parts II and III further describe the theories of the first kind and second kind, respectively. This book is written to make the literat

  7. A classification of hidden-variable properties

    International Nuclear Information System (INIS)

    Brandenburger, Adam; Yanofsky, Noson

    2008-01-01

    Hidden variables are extra components added to try to banish counterintuitive features of quantum mechanics. We start with a quantum-mechanical model and describe various properties that can be asked of a hidden-variable model. We present six such properties and a Venn diagram of how they are related. With two existence theorems and three no-go theorems (EPR, Bell and Kochen-Specker), we show which properties of empirically equivalent hidden-variable models are possible and which are not. Formally, our treatment relies only on classical probability models, and physical phenomena are used only to motivate which models to choose

  8. New Assumptions to Guide SETI Research

    Science.gov (United States)

    Colombano, S. P.

    2018-01-01

    The recent Kepler discoveries of Earth-like planets offer the opportunity to focus our attention on detecting signs of life and technology in specific planetary systems, but I feel we need to become more flexible in our assumptions. The reason is that, while it is still reasonable and conservative to assume that life is most likely to have originated in conditions similar to ours, the vast time differences in potential evolutions render the likelihood of "matching" technologies very slim. In light of these challenges I propose a more "aggressive"� approach to future SETI exploration in directions that until now have received little consideration.

  9. Assumptions for the Annual Energy Outlook 1992

    International Nuclear Information System (INIS)

    1992-01-01

    This report serves a auxiliary document to the Energy Information Administration (EIA) publication Annual Energy Outlook 1992 (AEO) (DOE/EIA-0383(92)), released in January 1992. The AEO forecasts were developed for five alternative cases and consist of energy supply, consumption, and price projections by major fuel and end-use sector, which are published at a national level of aggregation. The purpose of this report is to present important quantitative assumptions, including world oil prices and macroeconomic growth, underlying the AEO forecasts. The report has been prepared in response to external requests, as well as analyst requirements for background information on the AEO and studies based on the AEO forecasts

  10. Limiting assumptions in molecular modeling: electrostatics.

    Science.gov (United States)

    Marshall, Garland R

    2013-02-01

    Molecular mechanics attempts to represent intermolecular interactions in terms of classical physics. Initial efforts assumed a point charge located at the atom center and coulombic interactions. It is been recognized over multiple decades that simply representing electrostatics with a charge on each atom failed to reproduce the electrostatic potential surrounding a molecule as estimated by quantum mechanics. Molecular orbitals are not spherically symmetrical, an implicit assumption of monopole electrostatics. This perspective reviews recent evidence that requires use of multipole electrostatics and polarizability in molecular modeling.

  11. A criterion of orthogonality on the assumption and restrictions in subgrid-scale modelling of turbulence

    Energy Technology Data Exchange (ETDEWEB)

    Fang, L. [LMP, Ecole Centrale de Pékin, Beihang University, Beijing 100191 (China); Co-Innovation Center for Advanced Aero-Engine, Beihang University, Beijing 100191 (China); Sun, X.Y. [LMP, Ecole Centrale de Pékin, Beihang University, Beijing 100191 (China); Liu, Y.W., E-mail: liuyangwei@126.com [National Key Laboratory of Science and Technology on Aero-Engine Aero-Thermodynamics, School of Energy and Power Engineering, Beihang University, Beijing 100191 (China); Co-Innovation Center for Advanced Aero-Engine, Beihang University, Beijing 100191 (China)

    2016-12-09

    In order to shed light on understanding the subgrid-scale (SGS) modelling methodology, we analyze and define the concepts of assumption and restriction in the modelling procedure, then show by a generalized derivation that if there are multiple stationary restrictions in a modelling, the corresponding assumption function must satisfy a criterion of orthogonality. Numerical tests using one-dimensional nonlinear advection equation are performed to validate this criterion. This study is expected to inspire future research on generally guiding the SGS modelling methodology. - Highlights: • The concepts of assumption and restriction in the SGS modelling procedure are defined. • A criterion of orthogonality on the assumption and restrictions is derived. • Numerical tests using one-dimensional nonlinear advection equation are performed to validate this criterion.

  12. UV Photography Shows Hidden Sun Damage

    Science.gov (United States)

    ... mcat1=de12", ]; for (var c = 0; c UV photography shows hidden sun damage A UV photograph gives ... developing skin cancer and prematurely aged skin. Normal photography UV photography 18 months of age: This boy's ...

  13. Coding with partially hidden Markov models

    DEFF Research Database (Denmark)

    Forchhammer, Søren; Rissanen, J.

    1995-01-01

    Partially hidden Markov models (PHMM) are introduced. They are a variation of the hidden Markov models (HMM) combining the power of explicit conditioning on past observations and the power of using hidden states. (P)HMM may be combined with arithmetic coding for lossless data compression. A general...... 2-part coding scheme for given model order but unknown parameters based on PHMM is presented. A forward-backward reestimation of parameters with a redefined backward variable is given for these models and used for estimating the unknown parameters. Proof of convergence of this reestimation is given....... The PHMM structure and the conditions of the convergence proof allows for application of the PHMM to image coding. Relations between the PHMM and hidden Markov models (HMM) are treated. Results of coding bi-level images with the PHMM coding scheme is given. The results indicate that the PHMM can adapt...

  14. Hidden costs, value lost: uninsurance in America

    National Research Council Canada - National Science Library

    Committee on the Consequences of Uninsurance

    2003-01-01

    Hidden Cost, Value Lost , the fifth of a series of six books on the consequences of uninsurance in the United States, illustrates some of the economic and social losses to the country of maintaining...

  15. The hidden epidemic: confronting sexually transmitted diseases

    National Research Council Canada - National Science Library

    Eng, Thomas R; Butler, William T

    .... In addition, STDs increase the risk of HIV transmission. The Hidden Epidemic examines the scope of sexually transmitted infections in the United States and provides a critical assessment of the nation's response to this public health crisis...

  16. Petro Rents, Political Institutions, and Hidden Wealth

    DEFF Research Database (Denmark)

    Andersen, Jørgen Juel; Johannesen, Niels; Lassen, David Dreyer

    2017-01-01

    Do political institutions limit rent seeking by politicians? We study the transformation of petroleum rents, almost universally under direct government control, into hidden wealth using unique data on bank deposits in offshore financial centers that specialize in secrecy and asset protection. Our...... rulers is diverted to secret accounts. We find very limited evidence that shocks to other types of income not directly controlled by governments affect hidden wealth....

  17. Hidden charm molecules in a finite volume

    International Nuclear Information System (INIS)

    Albaladejo, M.; Hidalgo-Duque, C.; Nieves, J.; Oset, E.

    2014-01-01

    In the present paper we address the interaction of charmed mesons in hidden charm channels in a finite box. We use the interaction from a recent model based on heavy quark spin symmetry that predicts molecules of hidden charm in the infinite volume. The energy levels in the box are generated within this model, and several methods for the analysis of these levels ("inverse problem") are investigated. (author)

  18. Workplace ageism: discovering hidden bias.

    Science.gov (United States)

    Malinen, Sanna; Johnston, Lucy

    2013-01-01

    BACKGROUND/STUDY CONTEXT: Research largely shows no performance differences between older and younger employees, or that older workers even outperform younger employees, yet negative attitudes towards older workers can underpin discrimination. Unfortunately, traditional "explicit" techniques for assessing attitudes (i.e., self-report measures) have serious drawbacks. Therefore, using an approach that is novel to organizational contexts, the authors supplemented explicit with implicit (indirect) measures of attitudes towards older workers, and examined the malleability of both. This research consists of two studies. The authors measured self-report (explicit) attitudes towards older and younger workers with a survey, and implicit attitudes with a reaction-time-based measure of implicit associations. In addition, to test whether attitudes were malleable, the authors measured attitudes before and after a mental imagery intervention, where the authors asked participants in the experimental group to imagine respected and valued older workers from their surroundings. Negative, stable implicit attitudes towards older workers emerged in two studies. Conversely, explicit attitudes showed no age bias and were more susceptible to change intervention, such that attitudes became more positive towards older workers following the experimental manipulation. This research demonstrates the unconscious nature of bias against older workers, and highlights the utility of implicit attitude measures in the context of the workplace. In the current era of aging workforce and skill shortages, implicit measures may be necessary to illuminate hidden workplace ageism.

  19. Hidden slow pulsars in binaries

    Science.gov (United States)

    Tavani, Marco; Brookshaw, Leigh

    1993-01-01

    The recent discovery of the binary containing the slow pulsar PSR 1718-19 orbiting around a low-mass companion star adds new light on the characteristics of binary pulsars. The properties of the radio eclipses of PSR 1718-19 are the most striking observational characteristics of this system. The surface of the companion star produces a mass outflow which leaves only a small 'window' in orbital phase for the detection of PSR 1718-19 around 400 MHz. At this observing frequency, PSR 1718-19 is clearly observable only for about 1 hr out of the total 6.2 hr orbital period. The aim of this Letter is twofold: (1) to model the hydrodynamical behavior of the eclipsing material from the companion star of PSR 1718-19 and (2) to argue that a population of binary slow pulsars might have escaped detection in pulsar surveys carried out at 400 MHz. The possible existence of a population of partially or totally hidden slow pulsars in binaries will have a strong impact on current theories of binary evolution of neutron stars.

  20. Leakage-Resilient Circuits without Computational Assumptions

    DEFF Research Database (Denmark)

    Dziembowski, Stefan; Faust, Sebastian

    2012-01-01

    Physical cryptographic devices inadvertently leak information through numerous side-channels. Such leakage is exploited by so-called side-channel attacks, which often allow for a complete security breache. A recent trend in cryptography is to propose formal models to incorporate leakage...... on computational assumptions, our results are purely information-theoretic. In particular, we do not make use of public key encryption, which was required in all previous works...... into the model and to construct schemes that are provably secure within them. We design a general compiler that transforms any cryptographic scheme, e.g., a block-cipher, into a functionally equivalent scheme which is resilient to any continual leakage provided that the following three requirements are satisfied...

  1. Assumptions and Challenges of Open Scholarship

    Directory of Open Access Journals (Sweden)

    George Veletsianos

    2012-10-01

    Full Text Available Researchers, educators, policymakers, and other education stakeholders hope and anticipate that openness and open scholarship will generate positive outcomes for education and scholarship. Given the emerging nature of open practices, educators and scholars are finding themselves in a position in which they can shape and/or be shaped by openness. The intention of this paper is (a to identify the assumptions of the open scholarship movement and (b to highlight challenges associated with the movement’s aspirations of broadening access to education and knowledge. Through a critique of technology use in education, an understanding of educational technology narratives and their unfulfilled potential, and an appreciation of the negotiated implementation of technology use, we hope that this paper helps spark a conversation for a more critical, equitable, and effective future for education and open scholarship.

  2. Challenging the assumptions for thermal sensation scales

    DEFF Research Database (Denmark)

    Schweiker, Marcel; Fuchs, Xaver; Becker, Susanne

    2016-01-01

    Scales are widely used to assess the personal experience of thermal conditions in built environments. Most commonly, thermal sensation is assessed, mainly to determine whether a particular thermal condition is comfortable for individuals. A seven-point thermal sensation scale has been used...... extensively, which is suitable for describing a one-dimensional relationship between physical parameters of indoor environments and subjective thermal sensation. However, human thermal comfort is not merely a physiological but also a psychological phenomenon. Thus, it should be investigated how scales for its...... assessment could benefit from a multidimensional conceptualization. The common assumptions related to the usage of thermal sensation scales are challenged, empirically supported by two analyses. These analyses show that the relationship between temperature and subjective thermal sensation is non...

  3. The extended evolutionary synthesis: its structure, assumptions and predictions

    Science.gov (United States)

    Laland, Kevin N.; Uller, Tobias; Feldman, Marcus W.; Sterelny, Kim; Müller, Gerd B.; Moczek, Armin; Jablonka, Eva; Odling-Smee, John

    2015-01-01

    Scientific activities take place within the structured sets of ideas and assumptions that define a field and its practices. The conceptual framework of evolutionary biology emerged with the Modern Synthesis in the early twentieth century and has since expanded into a highly successful research program to explore the processes of diversification and adaptation. Nonetheless, the ability of that framework satisfactorily to accommodate the rapid advances in developmental biology, genomics and ecology has been questioned. We review some of these arguments, focusing on literatures (evo-devo, developmental plasticity, inclusive inheritance and niche construction) whose implications for evolution can be interpreted in two ways—one that preserves the internal structure of contemporary evolutionary theory and one that points towards an alternative conceptual framework. The latter, which we label the ‘extended evolutionary synthesis' (EES), retains the fundaments of evolutionary theory, but differs in its emphasis on the role of constructive processes in development and evolution, and reciprocal portrayals of causation. In the EES, developmental processes, operating through developmental bias, inclusive inheritance and niche construction, share responsibility for the direction and rate of evolution, the origin of character variation and organism–environment complementarity. We spell out the structure, core assumptions and novel predictions of the EES, and show how it can be deployed to stimulate and advance research in those fields that study or use evolutionary biology. PMID:26246559

  4. Dynamic Group Diffie-Hellman Key Exchange under standard assumptions

    International Nuclear Information System (INIS)

    Bresson, Emmanuel; Chevassut, Olivier; Pointcheval, David

    2002-01-01

    Authenticated Diffie-Hellman key exchange allows two principals communicating over a public network, and each holding public-private keys, to agree on a shared secret value. In this paper we study the natural extension of this cryptographic problem to a group of principals. We begin from existing formal security models and refine them to incorporate major missing details (e.g., strong-corruption and concurrent sessions). Within this model we define the execution of a protocol for authenticated dynamic group Diffie-Hellman and show that it is provably secure under the decisional Diffie-Hellman assumption. Our security result holds in the standard model and thus provides better security guarantees than previously published results in the random oracle model

  5. Hidden supersymmetry and spectral asymmetry: Fermion number fractionization and anomalies in even and odd dimensions

    International Nuclear Information System (INIS)

    Akhoury, R.; Comtet, A.

    1986-01-01

    We discuss how a ''hidden supersymmetry'' of the underlying field theories can be used to interpret and to calculate fermion number fractionization, axial anomalies, and anomalies in odd dimensions. All of the above effects can be related to a corresponding Witten index Δ(β) defined using the hidden sypersymmetry: thus providing a unified treatment for them. The relevance of the β dependence of the Witten index in the different cases is also discussed. Further, for the three-dimensional case, an expression for the parity violating part of the effective action at finite temperatures is obtained. copyright 1986 Academic Press, Inc

  6. Probing hidden sector photons through the Higgs window

    International Nuclear Information System (INIS)

    Ahlers, M.

    2008-07-01

    We investigate the possibility that a (light) hidden sector extra photon receives its mass via spontaneous symmetry breaking of a hidden sector Higgs boson, the so-called hidden-Higgs. The hidden-photon can mix with the ordinary photon via a gauge kinetic mixing term. The hidden-Higgs can couple to the Standard Model Higgs via a renormalizable quartic term - sometimes called the Higgs Portal. We discuss the implications of this light hidden-Higgs in the context of laser polarization and light-shining-through-the-wall experiments as well as cosmological, astrophysical, and non-Newtonian force measurements. For hidden-photons receiving their mass from a hidden-Higgs we find in the small mass regime significantly stronger bounds than the bounds on massive hidden sector photons alone. (orig.)

  7. Probing hidden sector photons through the Higgs window

    International Nuclear Information System (INIS)

    Ahlers, Markus; Jaeckel, Joerg; Redondo, Javier; Ringwald, Andreas

    2008-01-01

    We investigate the possibility that a (light) hidden sector extra photon receives its mass via spontaneous symmetry breaking of a hidden sector Higgs boson, the so-called hidden-Higgs. The hidden-photon can mix with the ordinary photon via a gauge kinetic mixing term. The hidden-Higgs can couple to the standard model Higgs via a renormalizable quartic term - sometimes called the Higgs portal. We discuss the implications of this light hidden-Higgs in the context of laser polarization and light-shining-through-the-wall experiments as well as cosmological, astrophysical, and non-Newtonian force measurements. For hidden-photons receiving their mass from a hidden-Higgs, we find in the small mass regime significantly stronger bounds than the bounds on massive hidden sector photons alone.

  8. Towards New Probabilistic Assumptions in Business Intelligence

    Directory of Open Access Journals (Sweden)

    Schumann Andrew

    2015-01-01

    Full Text Available One of the main assumptions of mathematical tools in science is represented by the idea of measurability and additivity of reality. For discovering the physical universe additive measures such as mass, force, energy, temperature, etc. are used. Economics and conventional business intelligence try to continue this empiricist tradition and in statistical and econometric tools they appeal only to the measurable aspects of reality. However, a lot of important variables of economic systems cannot be observable and additive in principle. These variables can be called symbolic values or symbolic meanings and studied within symbolic interactionism, the theory developed since George Herbert Mead and Herbert Blumer. In statistical and econometric tools of business intelligence we accept only phenomena with causal connections measured by additive measures. In the paper we show that in the social world we deal with symbolic interactions which can be studied by non-additive labels (symbolic meanings or symbolic values. For accepting the variety of such phenomena we should avoid additivity of basic labels and construct a new probabilistic method in business intelligence based on non-Archimedean probabilities.

  9. Assumptions for the Annual Energy Outlook 1993

    International Nuclear Information System (INIS)

    1993-01-01

    This report is an auxiliary document to the Annual Energy Outlook 1993 (AEO) (DOE/EIA-0383(93)). It presents a detailed discussion of the assumptions underlying the forecasts in the AEO. The energy modeling system is an economic equilibrium system, with component demand modules representing end-use energy consumption by major end-use sector. Another set of modules represents petroleum, natural gas, coal, and electricity supply patterns and pricing. A separate module generates annual forecasts of important macroeconomic and industrial output variables. Interactions among these components of energy markets generate projections of prices and quantities for which energy supply equals energy demand. This equilibrium modeling system is referred to as the Intermediate Future Forecasting System (IFFS). The supply models in IFFS for oil, coal, natural gas, and electricity determine supply and price for each fuel depending upon consumption levels, while the demand models determine consumption depending upon end-use price. IFFS solves for market equilibrium for each fuel by balancing supply and demand to produce an energy balance in each forecast year

  10. First Direct-Detection Constraints on eV-Scale Hidden-Photon Dark Matter with DAMIC at SNOLAB.

    Science.gov (United States)

    Aguilar-Arevalo, A; Amidei, D; Bertou, X; Butner, M; Cancelo, G; Castañeda Vázquez, A; Cervantes Vergara, B A; Chavarria, A E; Chavez, C R; de Mello Neto, J R T; D'Olivo, J C; Estrada, J; Fernandez Moroni, G; Gaïor, R; Guardincerri, Y; Hernández Torres, K P; Izraelevitch, F; Kavner, A; Kilminster, B; Lawson, I; Letessier-Selvon, A; Liao, J; Matalon, A; Mello, V B B; Molina, J; Privitera, P; Ramanathan, K; Sarkis, Y; Schwarz, T; Settimo, M; Sofo Haro, M; Thomas, R; Tiffenberg, J; Tiouchichine, E; Torres Machado, D; Trillaud, F; You, X; Zhou, J

    2017-04-07

    We present direct detection constraints on the absorption of hidden-photon dark matter with particle masses in the range 1.2-30  eV c^{-2} with the DAMIC experiment at SNOLAB. Under the assumption that the local dark matter is entirely constituted of hidden photons, the sensitivity to the kinetic mixing parameter κ is competitive with constraints from solar emission, reaching a minimum value of 2.2×10^{-14} at 17  eV c^{-2}. These results are the most stringent direct detection constraints on hidden-photon dark matter in the galactic halo with masses 3-12  eV c^{-2} and the first demonstration of direct experimental sensitivity to ionization signals dark matter interactions.

  11. First Direct-Detection Constraints on eV-Scale Hidden-Photon Dark Matter with DAMIC at SNOLAB

    Energy Technology Data Exchange (ETDEWEB)

    Aguilar-Arevalo, A.; Amidei, D.; Bertou, X.; Butner, M.; Cancelo, G.; Castañeda Vázquez, A.; Cervantes Vergara, B. A.; Chavarria, A. E.; Chavez, C. R.; de Mello Neto, J. R. T.; D’Olivo, J. C.; Estrada, J.; Fernandez Moroni, G.; Gaïor, R.; Guardincerri, Y.; Hernández Torres, K. P.; Izraelevitch, F.; Kavner, A.; Kilminster, B.; Lawson, I.; Letessier-Selvon, A.; Liao, J.; Matalon, A.; Mello, V. B. B.; Molina, J.; Privitera, P.; Ramanathan, K.; Sarkis, Y.; Schwarz, T.; Settimo, M.; Sofo Haro, M.; Thomas, R.; Tiffenberg, J.; Tiouchichine, E.; Torres Machado, D.; Trillaud, F.; You, X.; Zhou, J.

    2017-04-05

    We present direct detection constraints on the absorption of hidden-photon dark matter with particle masses in the range 1.2-30 eV$c^{-2}$ with the DAMIC experiment at SNOLAB. Under the assumption that the local dark matter is entirely constituted of hidden photons, the sensitivity to the kinetic mixing parameter $\\kappa$ is competitive with constraints from solar emission, reaching a minimum value of 2.2$\\times$$10^{-14}$ at 17 eV$c^{-2}$. These results are the most stringent direct detection constraints on hidden-photon dark matter with masses 3-12 eV$c^{-2}$ and the first demonstration of direct experimental sensitivity to ionization signals $<$12 eV from dark matter interactions.

  12. Fitting Hidden Markov Models to Psychological Data

    Directory of Open Access Journals (Sweden)

    Ingmar Visser

    2002-01-01

    Full Text Available Markov models have been used extensively in psychology of learning. Applications of hidden Markov models are rare however. This is partially due to the fact that comprehensive statistics for model selection and model assessment are lacking in the psychological literature. We present model selection and model assessment statistics that are particularly useful in applying hidden Markov models in psychology. These statistics are presented and evaluated by simulation studies for a toy example. We compare AIC, BIC and related criteria and introduce a prediction error measure for assessing goodness-of-fit. In a simulation study, two methods of fitting equality constraints are compared. In two illustrative examples with experimental data we apply selection criteria, fit models with constraints and assess goodness-of-fit. First, data from a concept identification task is analyzed. Hidden Markov models provide a flexible approach to analyzing such data when compared to other modeling methods. Second, a novel application of hidden Markov models in implicit learning is presented. Hidden Markov models are used in this context to quantify knowledge that subjects express in an implicit learning task. This method of analyzing implicit learning data provides a comprehensive approach for addressing important theoretical issues in the field.

  13. Geometric phases and hidden local gauge symmetry

    International Nuclear Information System (INIS)

    Fujikawa, Kazuo

    2005-01-01

    The analysis of geometric phases associated with level crossing is reduced to the familiar diagonalization of the Hamiltonian in the second quantized formulation. A hidden local gauge symmetry, which is associated with the arbitrariness of the phase choice of a complete orthonormal basis set, becomes explicit in this formulation (in particular, in the adiabatic approximation) and specifies physical observables. The choice of a basis set which specifies the coordinate in the functional space is arbitrary in the second quantization, and a subclass of coordinate transformations, which keeps the form of the action invariant, is recognized as the gauge symmetry. We discuss the implications of this hidden local gauge symmetry in detail by analyzing geometric phases for cyclic and noncyclic evolutions. It is shown that the hidden local symmetry provides a basic concept alternative to the notion of holonomy to analyze geometric phases and that the analysis based on the hidden local gauge symmetry leads to results consistent with the general prescription of Pancharatnam. We however note an important difference between the geometric phases for cyclic and noncyclic evolutions. We also explain a basic difference between our hidden local gauge symmetry and a gauge symmetry (or equivalence class) used by Aharonov and Anandan in their definition of generalized geometric phases

  14. Underlying assumptions and core beliefs in anorexia nervosa and dieting.

    Science.gov (United States)

    Cooper, M; Turner, H

    2000-06-01

    To investigate assumptions and beliefs in anorexia nervosa and dieting. The Eating Disorder Belief Questionnaire (EDBQ), was administered to patients with anorexia nervosa, dieters and female controls. The patients scored more highly than the other two groups on assumptions about weight and shape, assumptions about eating and negative self-beliefs. The dieters scored more highly than the female controls on assumptions about weight and shape. The cognitive content of anorexia nervosa (both assumptions and negative self-beliefs) differs from that found in dieting. Assumptions about weight and shape may also distinguish dieters from female controls.

  15. Adult-acquired hidden penis in obese patients: a critical survey of the literature.

    Science.gov (United States)

    Cavayero, Chase T; Cooper, Meghan A; Harlin, Stephen L

    2015-03-01

    Hidden penis is anatomically defined by a lack of firm attachments of the skin and dartos fascia to the underlying Buck fascia. To critically appraise the research evidence that could support the most effective surgical techniques for adult-acquired hidden penis in obese patients. Studies investigating patients with a diagnosis of hidden penis were identified. Of these studies, only those with adult patients classified as overweight or obese (body mass index >25) were included in the review. Three reviewers examined the abstracts of the studies identified in the initial Medline search, and abstracts considered potentially relevant underwent full-text review. Studies that included patients with congenital, iatrogenic (eg, circumcision issues or aesthetic genital surgery), or traumatic causes of hidden penis were excluded. Studies that did not define the diagnostic criteria for hidden penis were excluded to minimize the risk of definition bias. The quality of evidence for each study was determined after considering the following sources of bias: method of allocation to study groups, data analysis, presence of baseline differences between groups, objectivity of outcome, and completeness of follow-up. Using these criteria, studies were then graded as high, moderate, or low in quality. Seven studies with a total of 119 patients met the inclusion criteria. All but 1 of the studies were nonrandomized. One study provided a clear presentation of results and appropriate statistical analysis. Six studies accounted for individual-based differences, and 1 study failed to account for baseline differences altogether. Four studies addressed follow-up. One study was of high quality, 2 were of moderate quality, and 4 were of low quality. Building a clinical practice guideline for the surgical management of hidden penis has proven difficult because of a lack of high-quality, statistically significant data in the research synthesis. The authors elucidate the challenges and epitomize

  16. A scheme of hidden-structure attribute-based encryption with multiple authorities

    Science.gov (United States)

    Ling, J.; Weng, A. X.

    2018-05-01

    In the most of the CP-ABE schemes with hidden access structure, both all the user attributes and the key generation are managed by only one authority. The key generation efficiency will decrease as the number of user increases, and the data will encounter security issues as the only authority is attacked. We proposed a scheme of hidden-structure attribute-based encryption with multiple authorities, which introduces multiple semi-trusted attribute authorities, avoiding the threat even though one or more authorities are attacked. We also realized user revocation by managing a revocation list. Based on DBDH assumption, we proved that our scheme is of IND-CMA security. The analysis shows that our scheme improves the key generation efficiency.

  17. Massive hidden photons as lukewarm dark matter

    International Nuclear Information System (INIS)

    Redondo, Javier; Postma, Marieke

    2008-11-01

    We study the possibility that a keV-MeV mass hidden photon (HP), i.e. a hidden sector U(1) gauge boson, accounts for the observed amount of dark matter. We focus on the case where the HP interacts with the standard model sector only through kinetic mixing with the photon. The relic abundance is computed including all relevant plasma effects into the photon's self-energy, which leads to a resonant yield almost independent of the HP mass. The HP can decay into three photons. Moreover, if light enough it can be copiously produced in stars. Including bounds from cosmic photon backgrounds and stellar evolution, we find that the hidden photon can only give a subdominant contribution to the dark matter. This negative conclusion may be avoided if another production mechanism besides kinetic mixing is operative. (orig.)

  18. Massive hidden photons as lukewarm dark matter

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, Javier [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Postma, Marieke [Nationaal Inst. voor Kernfysica en Hoge-Energiefysica (NIKHEF), Amsterdam (Netherlands)

    2008-11-15

    We study the possibility that a keV-MeV mass hidden photon (HP), i.e. a hidden sector U(1) gauge boson, accounts for the observed amount of dark matter. We focus on the case where the HP interacts with the standard model sector only through kinetic mixing with the photon. The relic abundance is computed including all relevant plasma effects into the photon's self-energy, which leads to a resonant yield almost independent of the HP mass. The HP can decay into three photons. Moreover, if light enough it can be copiously produced in stars. Including bounds from cosmic photon backgrounds and stellar evolution, we find that the hidden photon can only give a subdominant contribution to the dark matter. This negative conclusion may be avoided if another production mechanism besides kinetic mixing is operative. (orig.)

  19. Religious Tolerance in the Hidden Curriculum

    Directory of Open Access Journals (Sweden)

    Kevin Nobel Kurniawan

    2018-03-01

    Full Text Available Religious intolerance is spreading within the Indonesian institution of education. Previous studies have shown that the growth of intolerance is due to the state’s regulation and pedagogical apparatus. In contrast to the previous studies, I argue that the intolerance is related to hidden curriculum applied by the institution of education.  Normatively, the hidden curriculum contains the value of religious tolerance. However, factually, the author found that there are practices of intolerance, through the formal and informal spheres in the school’s structure, within the hidden curriculum. This article applies a qualitative approach with a mixed method research strategy to analyze data collected from students, teachers, and alumnis through field observation, in-depth interview, and survey.

  20. Hidden treasures - 50 km points of interests

    Science.gov (United States)

    Lommi, Matias; Kortelainen, Jaana

    2015-04-01

    Tampere is third largest city in Finland and a regional centre. During 70's there occurred several communal mergers. Nowadays this local area has both strong and diversed identity - from wilderness and agricultural fields to high density city living. Outside the city center there are interesting geological points unknown for modern city settlers. There is even a local proverb, "Go abroad to Teisko!". That is the area the Hidden Treasures -student project is focused on. Our school Tammerkoski Upper Secondary School (or Gymnasium) has emphasis on visual arts. We are going to offer our art students scientific and artistic experiences and knowledge about the hidden treasures of Teisko area and involve the Teisko inhabitants into this project. Hidden treasures - Precambrian subduction zone and a volcanism belt with dense bed of gold (Au) and arsenic (As), operating goldmines and quarries of minerals and metamorphic slates. - North of subduction zone a homogenic precambrian magmastone area with quarries, products known as Kuru Grey. - Former ashores of post-glasial Lake Näsijärvi and it's sediments enabled the developing agriculture and sustained settlement. Nowadays these ashores have both scenery and biodiversity values. - Old cattle sheds and dairy buildings made of local granite stones related to cultural stonebuilding inheritance. - Local active community of Kapee, about 100 inhabitants. Students will discover information of these "hidden" phenomena, and rendering this information trough Enviromental Art Method. Final form of this project will be published in several artistic and informative geocaches. These caches are achieved by a GPS-based special Hidden Treasures Cycling Route and by a website guiding people to find these hidden points of interests.

  1. The origin of the hidden supersymmetry

    International Nuclear Information System (INIS)

    Jakubsky, Vit; Nieto, Luis-Miguel; Plyushchay, Mikhail S.

    2010-01-01

    The hidden supersymmetry and related tri-supersymmetric structure of the free particle system, the Dirac delta potential problem and the Aharonov-Bohm effect (planar, bound state, and tubule models) are explained by a special nonlocal unitary transformation, which for the usual N=2 supercharges has a nature of Foldy-Wouthuysen transformation. We show that in general case, the bosonized supersymmetry of nonlocal, parity even systems emerges in the same construction, and explain the origin of the unusual N=2 supersymmetry of electron in three-dimensional parity even magnetic field. The observation extends to include the hidden superconformal symmetry.

  2. Signatures of a hidden cosmic microwave background.

    Science.gov (United States)

    Jaeckel, Joerg; Redondo, Javier; Ringwald, Andreas

    2008-09-26

    If there is a light Abelian gauge boson gamma' in the hidden sector its kinetic mixing with the photon can produce a hidden cosmic microwave background (HCMB). For meV masses, resonant oscillations gammagamma' happen after big bang nucleosynthesis (BBN) but before CMB decoupling, increasing the effective number of neutrinos Nnu(eff) and the baryon to photon ratio, and distorting the CMB blackbody spectrum. The agreement between BBN and CMB data provides new constraints. However, including Lyman-alpha data, Nnu(eff) > 3 is preferred. It is tempting to attribute this effect to the HCMB. The interesting parameter range will be tested in upcoming laboratory experiments.

  3. Hidden simplicity of gauge theory amplitudes

    Energy Technology Data Exchange (ETDEWEB)

    Drummond, J M, E-mail: drummond@lapp.in2p3.f [LAPTH, Universite de Savoie, CNRS, B.P. 110, F-74941 Annecy-le-Vieux, Cedex (France)

    2010-11-07

    These notes were given as lectures at the CERN Winter School on Supergravity, Strings and Gauge Theory 2010. We describe the structure of scattering amplitudes in gauge theories, focussing on the maximally supersymmetric theory to highlight the hidden symmetries which appear. Using the Britto, Cachzo, Feng and Witten (BCFW) recursion relations we solve the tree-level S-matrix in N=4 super Yang-Mills theory and describe how it produces a sum of invariants of a large symmetry algebra. We review amplitudes in the planar theory beyond tree level, describing the connection between amplitudes and Wilson loops, and discuss the implications of the hidden symmetries.

  4. The zero-sum assumption in neutral biodiversity theory

    NARCIS (Netherlands)

    Etienne, R.S.; Alonso, D.; McKane, A.J.

    2007-01-01

    The neutral theory of biodiversity as put forward by Hubbell in his 2001 monograph has received much criticism for its unrealistic simplifying assumptions. These are the assumptions of functional equivalence among different species (neutrality), the assumption of point mutation speciation, and the

  5. Philosophy of Technology Assumptions in Educational Technology Leadership

    Science.gov (United States)

    Webster, Mark David

    2017-01-01

    A qualitative study using grounded theory methods was conducted to (a) examine what philosophy of technology assumptions are present in the thinking of K-12 technology leaders, (b) investigate how the assumptions may influence technology decision making, and (c) explore whether technological determinist assumptions are present. Subjects involved…

  6. Searching for hidden sectors in multiparticle production at the LHC

    CERN Document Server

    Sanchis-Lozano, Miguel-Angel; Moreno-Picot, Salvador

    2016-01-01

    We study the impact of a hidden sector beyond the Standard Model, e.g. a Hidden Valley model, on factorial moments and cumulants of multiplicity distributions in multiparticle production with a special emphasis on the prospects for LHC results.

  7. Detection of hidden explosives by fast neutron activation analysis

    International Nuclear Information System (INIS)

    Li Xinnian; Guo Junpeng; Luo Wenyun; Wang Chuanshan; Fang Xiaoming; Yu Tailiu

    2008-01-01

    The paper describes the method and principle for detection of hidden explosive by fast neutron activation analysis (FNAA). The method of detection of explosives by FNAA has the specific properties of simple determination equipments, high reliability, and low detecting cost, and would be beneficial to the applicability and popularization in the field of protecting and securing nation. The contents of nitrogen and oxygen in four explosives, more then ten common materials and TNT samples covered with soil, were measured by FNAA. 14 MeV fast neutrons were generated from (d, t) reaction with a 400 kV Cockcroft Walton type accelerator. The two-dimension distributions for nitro- gen and oxygen counting rates per unit mass of determined matters were obtained, and the characteristic area of explosives and non-explosives can be defined. By computer aided pattern recognition, the samples were identified with low false alarm or omission rates. The Monte-Carlo simulation indicates that there is no any radiation at 15 m apart from neutron source and is safe for irradiation after 1 h. It is suggested that FNAA may be potential in remote controlling for detection hidden explosive system with multi-probe large array. (authors)

  8. The hidden dimension of the language of corporations in America and Spain: perspectives for inter-legal communications

    OpenAIRE

    Orts Llopis, María Ángeles

    2006-01-01

    Starting from Edward T. Hall's assumptions regarding the cultural dimension as the 'hidden dimension' of communication, this study tries to highlight the fact that legal culture vastly influences legal interaction and, hence, varies from system to system. The translation of Company Law from American Legal English into Spanish consists of an exercise in inter-legal communication, as the translator must be aware of the culturally different way s in which the corporate world is contemplated, fro...

  9. Compressing the hidden variable space of a qubit

    OpenAIRE

    Montina, Alberto

    2010-01-01

    In previously exhibited hidden variable models of quantum state preparation and measurement, the number of continuous hidden variables describing the actual state of a single realization is never smaller than the quantum state manifold dimension. We introduce a simple model for a qubit whose hidden variable space is one-dimensional, i.e., smaller than the two-dimensional Bloch sphere. The hidden variable probability distributions associated with the quantum states satisfy reasonable criteria ...

  10. HYPROLOG: A New Logic Programming Language with Assumptions and Abduction

    DEFF Research Database (Denmark)

    Christiansen, Henning; Dahl, Veronica

    2005-01-01

    We present HYPROLOG, a novel integration of Prolog with assumptions and abduction which is implemented in and partly borrows syntax from Constraint Handling Rules (CHR) for integrity constraints. Assumptions are a mechanism inspired by linear logic and taken over from Assumption Grammars. The lan......We present HYPROLOG, a novel integration of Prolog with assumptions and abduction which is implemented in and partly borrows syntax from Constraint Handling Rules (CHR) for integrity constraints. Assumptions are a mechanism inspired by linear logic and taken over from Assumption Grammars....... The language shows a novel flexibility in the interaction between the different paradigms, including all additional built-in predicates and constraints solvers that may be available. Assumptions and abduction are especially useful for language processing, and we can show how HYPROLOG works seamlessly together...

  11. Hidden Markov Models for Human Genes

    DEFF Research Database (Denmark)

    Baldi, Pierre; Brunak, Søren; Chauvin, Yves

    1997-01-01

    We analyse the sequential structure of human genomic DNA by hidden Markov models. We apply models of widely different design: conventional left-right constructs and models with a built-in periodic architecture. The models are trained on segments of DNA sequences extracted such that they cover com...

  12. The Hidden Cost of Buying a Computer.

    Science.gov (United States)

    Johnson, Michael

    1983-01-01

    In order to process data in a computer, application software must be either developed or purchased. Costs for modifications of the software package and maintenance are often hidden. The decision to buy or develop software packages should be based upon factors of time and maintenance. (MLF)

  13. Hidden symmetries in five-dimensional supergravity

    International Nuclear Information System (INIS)

    Poessel, M.

    2003-05-01

    This thesis is concerned with the study of hidden symmetries in supergravity, which play an important role in the present picture of supergravity and string theory. Concretely, the appearance of a hidden G 2(+2) /SO(4) symmetry is studied in the dimensional reduction of d=5, N=2 supergravity to three dimensions - a parallel model to the more famous E 8(+8) /SO(16) case in eleven-dimensional supergravity. Extending previous partial results for the bosonic part, I give a derivation that includes fermionic terms. This sheds new light on the appearance of the local hidden symmetry SO(4) in the reduction, and shows up an unusual feature which follows from an analysis of the R-symmetry associated with N=4 supergravity and of the supersymmetry variations, and which has no parallel in the eleven-dimensional case: The emergence of an additional SO(3) as part of the enhanced local symmetry, invisible in the dimensional reduction of the gravitino, and corresponding to the fact that, of the SO(4) used in the coset model, only the diagonal SO(3) is visible immediately upon dimensional reduction. The uncovering of the hidden symmetries proceeds via the construction of the proper coset gravity in three dimensions, and matching it with the Lagrangian obtained from the reduction. (orig.)

  14. Discovering hidden sectors with monophoton Z' searches

    International Nuclear Information System (INIS)

    Gershtein, Yuri; Petriello, Frank; Quackenbush, Seth; Zurek, Kathryn M.

    2008-01-01

    In many theories of physics beyond the standard model, from extra dimensions to Hidden Valleys and models of dark matter, Z ' bosons mediate between standard model particles and hidden sector states. We study the feasibility of observing such hidden states through an invisibly decaying Z ' at the LHC. We focus on the process pp→γZ ' →γXX † , where X is any neutral, (quasi-) stable particle, whether a standard model neutrino or a new state. This complements a previous study using pp→ZZ ' →l + l - XX † . Only the Z ' mass and two effective charges are needed to describe this process. If the Z ' decays invisibly only to standard model neutrinos, then these charges are predicted by observation of the Z ' through the Drell-Yan process, allowing discrimination between Z ' decays to standard model ν's and invisible decays to new states. We carefully discuss all backgrounds and systematic errors that affect this search. We find that hidden sector decays of a 1 TeV Z ' can be observed at 5σ significance with 50 fb -1 at the LHC. Observation of a 1.5 TeV state requires super-LHC statistics of 1 ab -1 . Control of the systematic errors, in particular, the parton distribution function uncertainty of the dominant Zγ background, is crucial to maximize the LHC search reach.

  15. Hidden Markov models for labeled sequences

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose

    1994-01-01

    A hidden Markov model for labeled observations, called a class HMM, is introduced and a maximum likelihood method is developed for estimating the parameters of the model. Instead of training it to model the statistics of the training sequences it is trained to optimize recognition. It resembles MMI...

  16. Assessing framing assumptions in quantitative health impact assessments: a housing intervention example.

    Science.gov (United States)

    Mesa-Frias, Marco; Chalabi, Zaid; Foss, Anna M

    2013-09-01

    Health impact assessment (HIA) is often used to determine ex ante the health impact of an environmental policy or an environmental intervention. Underpinning any HIA is the framing assumption, which defines the causal pathways mapping environmental exposures to health outcomes. The sensitivity of the HIA to the framing assumptions is often ignored. A novel method based on fuzzy cognitive map (FCM) is developed to quantify the framing assumptions in the assessment stage of a HIA, and is then applied to a housing intervention (tightening insulation) as a case-study. Framing assumptions of the case-study were identified through a literature search of Ovid Medline (1948-2011). The FCM approach was used to identify the key variables that have the most influence in a HIA. Changes in air-tightness, ventilation, indoor air quality and mould/humidity have been identified as having the most influence on health. The FCM approach is widely applicable and can be used to inform the formulation of the framing assumptions in any quantitative HIA of environmental interventions. We argue that it is necessary to explore and quantify framing assumptions prior to conducting a detailed quantitative HIA during the assessment stage. Copyright © 2013 Elsevier Ltd. All rights reserved.

  17. IEEE 802.11e (EDCA analysis in the presence of hidden stations

    Directory of Open Access Journals (Sweden)

    Xijie Liu

    2011-07-01

    Full Text Available The key contribution of this paper is the combined analytical analysis of both saturated and non-saturated throughput of IEEE 802.11e networks in the presence of hidden stations. This approach is an extension to earlier works by other authors which provided Markov chain analysis to the IEEE 802.11 family under various assumptions. Our approach also modifies earlier expressions for the probability that a station transmits a packet in a vulnerable period. The numerical results provide the impact of the access categories on the channel throughput. Various throughput results under different mechanisms are presented.

  18. "Guess What?": On Hidden-Camera Pranks' Revelation Sequences

    Directory of Open Access Journals (Sweden)

    A. Javier Izquierdo-Martín

    2004-05-01

    Full Text Available Conceived as public communication objects, hidden-camera pranks (HCPs are a type of documentary on ordinary pranks. Defined versus classical Garfinkelian breaching experiments, HCPs also offer a natural form of ethnomethodological experimentation. Here I present some results of an analysis of a sample of forty-nine HCPs' revelation sequences (RSs. These little clips of five to fifty seconds long allow for the description of audio-visual details of the interactional work that actors, accomplices and victims of a HCP have to perform, in a finely coordinated manner in order "to put an end" to an artificially constructed social situation. My study focuses on a set of practical relevances of the work of revelation (offering and awakening (acceptation/rejection endogenously pointed at and topicalized by the agents enmeshed in the HCP situation. URN: urn:nbn:de:0114-fqs0402126

  19. Pre-quantum mechanics. Introduction to models with hidden variables

    International Nuclear Information System (INIS)

    Grea, J.

    1976-01-01

    Within the context of formalism of hidden variable type, the author considers the models used to describe mechanical systems before the introduction of the quantum model. An account is given of the characteristics of the theoretical models and their relationships with experimental methodology. The models of analytical, pre-ergodic, stochastic and thermodynamic mechanics are studied in succession. At each stage the physical hypothesis is enunciated by postulate corresponding to the type of description of the reality of the model. Starting from this postulate, the physical propositions which are meaningful for the model under consideration are defined and their logical structure is indicated. It is then found that on passing from one level of description to another, one can obtain successively Boolean lattices embedded in lattices of continuous geometric type, which are themselves embedded in Boolean lattices. It is therefore possible to envisage a more detailed description than that given by the quantum lattice and to construct it by analogy. (Auth.)

  20. Hidden Symmetries of Stochastic Models

    Directory of Open Access Journals (Sweden)

    Boyka Aneva

    2007-05-01

    Full Text Available In the matrix product states approach to $n$ species diffusion processes the stationary probability distribution is expressed as a matrix product state with respect to a quadratic algebra determined by the dynamics of the process. The quadratic algebra defines a noncommutative space with a $SU_q(n$ quantum group action as its symmetry. Boundary processes amount to the appearance of parameter dependent linear terms in the algebraic relations and lead to a reduction of the $SU_q(n$ symmetry. We argue that the boundary operators of the asymmetric simple exclusion process generate a tridiagonal algebra whose irriducible representations are expressed in terms of the Askey-Wilson polynomials. The Askey-Wilson algebra arises as a symmetry of the boundary problem and allows to solve the model exactly.

  1. The assumption in Bell's inequalities and entanglement problem

    Czech Academy of Sciences Publication Activity Database

    Lokajíček, Miloš V.

    2012-01-01

    Roč. 9, MAR (2012), 2018-2020 ISSN 1546-1955 R&D Projects: GA MŠk LA08015 Institutional research plan: CEZ:AV0Z10100502 Keywords : EPR experiment * quantum physics * hidden variables Subject RIV: BF - Elementary Particles and High Energy Physics Impact factor: 0.673, year: 2012

  2. Investigating the Assumptions of Uses and Gratifications Research

    Science.gov (United States)

    Lometti, Guy E.; And Others

    1977-01-01

    Discusses a study designed to determine empirically the gratifications sought from communication channels and to test the assumption that individuals differentiate channels based on gratifications. (MH)

  3. Detection of bursts in extracellular spike trains using hidden semi-Markov point process models.

    Science.gov (United States)

    Tokdar, Surya; Xi, Peiyi; Kelly, Ryan C; Kass, Robert E

    2010-08-01

    Neurons in vitro and in vivo have epochs of bursting or "up state" activity during which firing rates are dramatically elevated. Various methods of detecting bursts in extracellular spike trains have appeared in the literature, the most widely used apparently being Poisson Surprise (PS). A natural description of the phenomenon assumes (1) there are two hidden states, which we label "burst" and "non-burst," (2) the neuron evolves stochastically, switching at random between these two states, and (3) within each state the spike train follows a time-homogeneous point process. If in (2) the transitions from non-burst to burst and burst to non-burst states are memoryless, this becomes a hidden Markov model (HMM). For HMMs, the state transitions follow exponential distributions, and are highly irregular. Because observed bursting may in some cases be fairly regular-exhibiting inter-burst intervals with small variation-we relaxed this assumption. When more general probability distributions are used to describe the state transitions the two-state point process model becomes a hidden semi-Markov model (HSMM). We developed an efficient Bayesian computational scheme to fit HSMMs to spike train data. Numerical simulations indicate the method can perform well, sometimes yielding very different results than those based on PS.

  4. Extended abstract of a hidden agenda

    Energy Technology Data Exchange (ETDEWEB)

    Goguen, J.; Malcolm, G. [Oxford Univ. (United Kingdom)

    1996-12-31

    The initial goal of our hidden research programme was both straightforward and ambitious: give a semantics for software engineering, and in particular for the object paradigm, supporting correctness proofs that are as simple and mechanical as possible. This emphasizes proofs rather than models, and thus suggests an equational approach, rather than one based on higher order logic, denotational semantics, or any kind of model, because equational proofs achieve maximal simplicity and mechanization, and yet are fully expressive. We introduce powerful coinduction techniques for proving behavioral properties of complex systems. We make the no doubt outrageous claim that our hidden approach gives simpler proofs than other formalisms; this is because we exploit algebraic structure that most other approaches discard.

  5. Laser experiments explore the hidden sector

    International Nuclear Information System (INIS)

    Ahlers, M.

    2007-11-01

    Recently, the laser experiments BMV and GammeV, searching for light shining through walls, have published data and calculated new limits on the allowed masses and couplings for axion-like particles. In this note we point out that these experiments can serve to constrain a much wider variety of hidden-sector particles such as, e.g., minicharged particles and hidden-sector photons. The new experiments improve the existing bounds from the older BFRT experiment by a factor of two. Moreover, we use the new PVLAS constraints on a possible rotation and ellipticity of light after it has passed through a strong magnetic field to constrain pure minicharged particle models. For masses -7 times the electron electric charge. This is the best laboratory bound and comparable to bounds inferred from the energy spectrum of the cosmic microwave background. (orig.)

  6. Quantum mechanics and hidden superconformal symmetry

    Science.gov (United States)

    Bonezzi, R.; Corradini, O.; Latini, E.; Waldron, A.

    2017-12-01

    Solvability of the ubiquitous quantum harmonic oscillator relies on a spectrum generating osp (1 |2 ) superconformal symmetry. We study the problem of constructing all quantum mechanical models with a hidden osp (1 |2 ) symmetry on a given space of states. This problem stems from interacting higher spin models coupled to gravity. In one dimension, we show that the solution to this problem is the Vasiliev-Plyushchay family of quantum mechanical models with hidden superconformal symmetry obtained by viewing the harmonic oscillator as a one dimensional Dirac system, so that Grassmann parity equals wave function parity. These models—both oscillator and particlelike—realize all possible unitary irreducible representations of osp (1 |2 ).

  7. Hidden Costs and the Role of Modularity

    DEFF Research Database (Denmark)

    Larsen, Marcus M.

    2013-01-01

    that the inability to effectively estimate the costs of implementing an activity in a foreign location has a negative impact on the process performance of that activity. Performance is deterred as operations are likely to be disrupted by opportunity costs and managerial responses. However, this relationship......This paper addresses estimation errors in strategic decision-making processes due to hidden costs. While previous research has investigated the antecedents of hidden costs, this paper investigates performance consequences. Using unique data on 221 offshoring implementations, it is argued...... is mitigated by the degree of modularity in the activity as it reduces the need for costly coordination in offshoring. This paper contributes to research on offshoring and strategic decision-making by emphasizing the importance of organizational design and of estimating the costs of internal organizational...

  8. Single-hidden-layer feed-forward quantum neural network based on Grover learning.

    Science.gov (United States)

    Liu, Cheng-Yi; Chen, Chein; Chang, Ching-Ter; Shih, Lun-Min

    2013-09-01

    In this paper, a novel single-hidden-layer feed-forward quantum neural network model is proposed based on some concepts and principles in the quantum theory. By combining the quantum mechanism with the feed-forward neural network, we defined quantum hidden neurons and connected quantum weights, and used them as the fundamental information processing unit in a single-hidden-layer feed-forward neural network. The quantum neurons make a wide range of nonlinear functions serve as the activation functions in the hidden layer of the network, and the Grover searching algorithm outstands the optimal parameter setting iteratively and thus makes very efficient neural network learning possible. The quantum neuron and weights, along with a Grover searching algorithm based learning, result in a novel and efficient neural network characteristic of reduced network, high efficient training and prospect application in future. Some simulations are taken to investigate the performance of the proposed quantum network and the result show that it can achieve accurate learning. Copyright © 2013 Elsevier Ltd. All rights reserved.

  9. The Hidden Gifts of Quiet Kids

    Science.gov (United States)

    Trierweiler, Hannah

    2006-01-01

    The author relates that she was an introvert child. It has always taken her time and energy to find her place in a group. As a grown-up, she still needed quiet time to regroup during a busy day. In this article, the author presents an interview with Marti Olsen Laney, author of "The Hidden Gifts of the Introverted Child." During the interview,…

  10. Hidden neuronal correlations in cultured networks

    International Nuclear Information System (INIS)

    Segev, Ronen; Baruchi, Itay; Hulata, Eyal; Ben-Jacob, Eshel

    2004-01-01

    Utilization of a clustering algorithm on neuronal spatiotemporal correlation matrices recorded during a spontaneous activity of in vitro networks revealed the existence of hidden correlations: the sequence of synchronized bursting events (SBEs) is composed of statistically distinguishable subgroups each with its own distinct pattern of interneuron spatiotemporal correlations. These findings hint that each of the SBE subgroups can serve as a template for coding, storage, and retrieval of a specific information

  11. Cold dark matter from the hidden sector

    International Nuclear Information System (INIS)

    Arias, Paola; Pontificia Univ. Catolica de Chile, Santiago

    2012-02-01

    Weakly interacting slim particles (WISPs) such as hidden photons (HP) and axion-like particles (ALPs) have been proposed as cold dark matter candidates. They might be produced non-thermally via the misalignment mechanism, similarly to cold axions. In this talk we review the main processes of thermalisation of HP and we compute the parameter space that may survive as cold dark matter population until today. Our findings are quite encouraging for experimental searches in the laboratory in the near future.

  12. Completing Quantum Mechanics with Quantized Hidden Variables

    OpenAIRE

    van Enk, S. J.

    2015-01-01

    I explore the possibility that a quantum system S may be described completely by the combination of its standard quantum state $|\\psi\\rangle$ and a (hidden) quantum state $|\\phi\\rangle$ (that lives in the same Hilbert space), such that the outcome of any standard projective measurement on the system S is determined once the two quantum states are specified. I construct an algorithm that retrieves the standard quantum-mechanical probabilities, which depend only on $|\\psi\\rangle$, by assuming t...

  13. Cold dark matter from the hidden sector

    Energy Technology Data Exchange (ETDEWEB)

    Arias, Paola [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Pontificia Univ. Catolica de Chile, Santiago (Chile). Facultad de Fisica

    2012-02-15

    Weakly interacting slim particles (WISPs) such as hidden photons (HP) and axion-like particles (ALPs) have been proposed as cold dark matter candidates. They might be produced non-thermally via the misalignment mechanism, similarly to cold axions. In this talk we review the main processes of thermalisation of HP and we compute the parameter space that may survive as cold dark matter population until today. Our findings are quite encouraging for experimental searches in the laboratory in the near future.

  14. Hidden histories: challenges for pedagogy and participation

    OpenAIRE

    Morrice, Linda

    2013-01-01

    Higher Education has become and an increasingly diverse and globalised system in which the binaries between ‘traditional’ and ‘non-traditional’ students, exclusion and inclusion have less resonance and analytical purchase. Drawing on research with refugees Linda will suggest that higher education can be marked simultaneously by belonging and recognition, deficit and exclusion. Complex differences and inequalities remain hidden and unspoken, raising new questions and challenges for pedagogy an...

  15. Hidden sector behind the CKM matrix

    Science.gov (United States)

    Okawa, Shohei; Omura, Yuji

    2017-08-01

    The small quark mixing, described by the Cabibbo-Kobayashi-Maskawa (CKM) matrix in the standard model, may be a clue to reveal new physics around the TeV scale. We consider a simple scenario that extra particles in a hidden sector radiatively mediate the flavor violation to the quark sector around the TeV scale and effectively realize the observed CKM matrix. The lightest particle in the hidden sector, whose contribution to the CKM matrix is expected to be dominant, is a good dark matter (DM) candidate. There are many possible setups to describe this scenario, so that we investigate some universal predictions of this kind of model, focusing on the contribution of DM to the quark mixing and flavor physics. In this scenario, there is an explicit relation between the CKM matrix and flavor violating couplings, such as four-quark couplings, because both are radiatively induced by the particles in the hidden sector. Then, we can explicitly find the DM mass region and the size of Yukawa couplings between the DM and quarks, based on the study of flavor physics and DM physics. In conclusion, we show that DM mass in our scenario is around the TeV scale, and the Yukawa couplings are between O (0.01 ) and O (1 ). The spin-independent DM scattering cross section is estimated as O (10-9) [pb]. An extra colored particle is also predicted at the O (10 ) TeV scale.

  16. The Hidden World within Plants: Ecological and Evolutionary Considerations for Defining Functioning of Microbial Endophytes

    Science.gov (United States)

    van Overbeek, Leonard S.; Berg, Gabriele; Pirttilä, Anna Maria; Compant, Stéphane; Campisano, Andrea; Döring, Matthias; Sessitsch, Angela

    2015-01-01

    SUMMARY All plants are inhabited internally by diverse microbial communities comprising bacterial, archaeal, fungal, and protistic taxa. These microorganisms showing endophytic lifestyles play crucial roles in plant development, growth, fitness, and diversification. The increasing awareness of and information on endophytes provide insight into the complexity of the plant microbiome. The nature of plant-endophyte interactions ranges from mutualism to pathogenicity. This depends on a set of abiotic and biotic factors, including the genotypes of plants and microbes, environmental conditions, and the dynamic network of interactions within the plant biome. In this review, we address the concept of endophytism, considering the latest insights into evolution, plant ecosystem functioning, and multipartite interactions. PMID:26136581

  17. The Hidden World within Plants: Ecological and Evolutionary Considerations for Defining Functioning of Microbial Endophytes.

    Science.gov (United States)

    Hardoim, Pablo R; van Overbeek, Leonard S; Berg, Gabriele; Pirttilä, Anna Maria; Compant, Stéphane; Campisano, Andrea; Döring, Matthias; Sessitsch, Angela

    2015-09-01

    All plants are inhabited internally by diverse microbial communities comprising bacterial, archaeal, fungal, and protistic taxa. These microorganisms showing endophytic lifestyles play crucial roles in plant development, growth, fitness, and diversification. The increasing awareness of and information on endophytes provide insight into the complexity of the plant microbiome. The nature of plant-endophyte interactions ranges from mutualism to pathogenicity. This depends on a set of abiotic and biotic factors, including the genotypes of plants and microbes, environmental conditions, and the dynamic network of interactions within the plant biome. In this review, we address the concept of endophytism, considering the latest insights into evolution, plant ecosystem functioning, and multipartite interactions. Copyright © 2015, American Society for Microbiology. All Rights Reserved.

  18. Distributed automata in an assumption-commitment framework

    Indian Academy of Sciences (India)

    We propose a class of finite state systems of synchronizing distributed processes, where processes make assumptions at local states about the state of other processes in the system. This constrains the global states of the system to those where assumptions made by a process about another are compatible with the ...

  19. 40 CFR 264.150 - State assumption of responsibility.

    Science.gov (United States)

    2010-07-01

    ... FACILITIES Financial Requirements § 264.150 State assumption of responsibility. (a) If a State either assumes legal responsibility for an owner's or operator's compliance with the closure, post-closure care, or... 40 Protection of Environment 25 2010-07-01 2010-07-01 false State assumption of responsibility...

  20. 40 CFR 261.150 - State assumption of responsibility.

    Science.gov (United States)

    2010-07-01

    ... Excluded Hazardous Secondary Materials § 261.150 State assumption of responsibility. (a) If a State either assumes legal responsibility for an owner's or operator's compliance with the closure or liability... 40 Protection of Environment 25 2010-07-01 2010-07-01 false State assumption of responsibility...

  1. 40 CFR 265.150 - State assumption of responsibility.

    Science.gov (United States)

    2010-07-01

    ..., STORAGE, AND DISPOSAL FACILITIES Financial Requirements § 265.150 State assumption of responsibility. (a) If a State either assumes legal responsibility for an owner's or operator's compliance with the... 40 Protection of Environment 25 2010-07-01 2010-07-01 false State assumption of responsibility...

  2. 40 CFR 144.66 - State assumption of responsibility.

    Science.gov (United States)

    2010-07-01

    ... PROGRAMS (CONTINUED) UNDERGROUND INJECTION CONTROL PROGRAM Financial Responsibility: Class I Hazardous Waste Injection Wells § 144.66 State assumption of responsibility. (a) If a State either assumes legal... 40 Protection of Environment 22 2010-07-01 2010-07-01 false State assumption of responsibility...

  3. 40 CFR 267.150 - State assumption of responsibility.

    Science.gov (United States)

    2010-07-01

    ... STANDARDIZED PERMIT Financial Requirements § 267.150 State assumption of responsibility. (a) If a State either assumes legal responsibility for an owner's or operator's compliance with the closure care or liability... 40 Protection of Environment 26 2010-07-01 2010-07-01 false State assumption of responsibility...

  4. Capturing Assumptions while Designing a Verification Model for Embedded Systems

    NARCIS (Netherlands)

    Marincic, J.; Mader, Angelika H.; Wieringa, Roelf J.

    A formal proof of a system correctness typically holds under a number of assumptions. Leaving them implicit raises the chance of using the system in a context that violates some assumptions, which in return may invalidate the correctness proof. The goal of this paper is to show how combining

  5. Modification of the Newtonian dynamics as a possible alternative to the hidden mass hypothesis1

    International Nuclear Information System (INIS)

    Milgrom, M.; The Institute for Advanced Study)

    1983-01-01

    I consider the possibility that there is not, in fact, much hidden mass in galaxies and galaxy systems. If a certain modified version of the Newtonian dynamics is used to describe the motion of bodies in a gravitational field (of a galaxy, say), the observational results are reproduced with no need to assume hidden mass in appreciable quantities. Various characteristics of galaxies result with no further assumptions. In the basis of the modification is the assumption that in the limit of small acceleration a 0 , the acceleration of a particle at distance r from a mass M satisfies approximately a 2 /a 0 roughly-equalMGr -2 , where a 0 is a constant of the dimensions of an acceleration. A success of this modified dynamics in explaining the data may be interpreted as implying a need to change the law of inertia in the limit of small accelerations or a more limited change of gravity alone. I discuss various observational constraints on possible theories for the modified dynamics from data which exist already and suggest other systems which may provide useful constraints

  6. PFP issues/assumptions development and management planning guide

    International Nuclear Information System (INIS)

    SINCLAIR, J.C.

    1999-01-01

    The PFP Issues/Assumptions Development and Management Planning Guide presents the strategy and process used for the identification, allocation, and maintenance of an Issues/Assumptions Management List for the Plutonium Finishing Plant (PFP) integrated project baseline. Revisions to this document will include, as attachments, the most recent version of the Issues/Assumptions Management List, both open and current issues/assumptions (Appendix A), and closed or historical issues/assumptions (Appendix B). This document is intended be a Project-owned management tool. As such, this document will periodically require revisions resulting from improvements of the information, processes, and techniques as now described. Revisions that suggest improved processes will only require PFP management approval

  7. Defining and Distinguishing Traditional and Religious Terrorism

    OpenAIRE

    Gregg, Heather S.

    2014-01-01

    The article of record may be found at: http://dx.doi.org/10.1080/23296151.2016.1239978 thus offering few if any policy options for counterterrorism measures. This assumption about religious terrorism stems from two challenges in the literature: disproportionate attention to apocalyptic terrorism, and a lack of distinction between religious terrorism and its secular counterpart. This article, therefore, aims to do four things: define and differentiate religiously motivated terrorism from tr...

  8. Microwave background constraints on mixing of photons with hidden photons

    International Nuclear Information System (INIS)

    Mirizzi, Alessandro; Redondo, Javier; Sigl, Guenter

    2008-12-01

    Various extensions of the Standard Model predict the existence of hidden photons kinetically mixing with the ordinary photon. This mixing leads to oscillations between photons and hidden photons, analogous to the observed oscillations between different neutrino flavors. In this context, we derive new bounds on the photon-hidden photon mixing parameters using the high precision cosmic microwave background spectral data collected by the Far Infrared Absolute Spectrophotometer instrument on board of the Cosmic Background Explorer. Requiring the distortions of the CMB induced by the photon-hidden photon mixing to be smaller than experimental upper limits, this leads to a bound on the mixing angle χ 0 -7 - 10 -5 for hidden photon masses between 10 -14 eV and 10 -7 eV. This low-mass and low-mixing region of the hidden photon parameter space was previously unconstrained. (orig.)

  9. Microwave background constraints on mixing of photons with hidden photons

    Energy Technology Data Exchange (ETDEWEB)

    Mirizzi, Alessandro [Max-Planck-Institut fuer Physik, Muenchen (Germany); Redondo, Javier [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany); Sigl, Guenter [Hamburg Univ. (Germany). 2. Inst. fuer Theoretische Physik

    2008-12-15

    Various extensions of the Standard Model predict the existence of hidden photons kinetically mixing with the ordinary photon. This mixing leads to oscillations between photons and hidden photons, analogous to the observed oscillations between different neutrino flavors. In this context, we derive new bounds on the photon-hidden photon mixing parameters using the high precision cosmic microwave background spectral data collected by the Far Infrared Absolute Spectrophotometer instrument on board of the Cosmic Background Explorer. Requiring the distortions of the CMB induced by the photon-hidden photon mixing to be smaller than experimental upper limits, this leads to a bound on the mixing angle {chi}{sub 0} hidden photon masses between 10{sup -14} eV and 10{sup -7} eV. This low-mass and low-mixing region of the hidden photon parameter space was previously unconstrained. (orig.)

  10. VISIBLE COSTS AND HIDDEN COSTS IN THE BAKING INDUSTRY

    Directory of Open Access Journals (Sweden)

    Criveanu Maria

    2013-04-01

    Full Text Available Hidden costs are present in the activity of any company, hardly identified in the traditional administrative accounting. The high levels of the hidden costs and their unknown presence have serious consequences on the decisions made by the managers. This paper aims at presenting some aspects related to the hidden costs that occur in the activity of the companies in the baking industry and the possibilities to reduce their level.

  11. MONITORED GEOLOGIC REPOSITORY LIFE CYCLE COST ESTIMATE ASSUMPTIONS DOCUMENT

    International Nuclear Information System (INIS)

    R.E. Sweeney

    2001-01-01

    The purpose of this assumptions document is to provide general scope, strategy, technical basis, schedule and cost assumptions for the Monitored Geologic Repository (MGR) life cycle cost (LCC) estimate and schedule update incorporating information from the Viability Assessment (VA) , License Application Design Selection (LADS), 1999 Update to the Total System Life Cycle Cost (TSLCC) estimate and from other related and updated information. This document is intended to generally follow the assumptions outlined in the previous MGR cost estimates and as further prescribed by DOE guidance

  12. Monitored Geologic Repository Life Cycle Cost Estimate Assumptions Document

    International Nuclear Information System (INIS)

    Sweeney, R.

    2000-01-01

    The purpose of this assumptions document is to provide general scope, strategy, technical basis, schedule and cost assumptions for the Monitored Geologic Repository (MGR) life cycle cost estimate and schedule update incorporating information from the Viability Assessment (VA), License Application Design Selection (LADS), 1999 Update to the Total System Life Cycle Cost (TSLCC) estimate and from other related and updated information. This document is intended to generally follow the assumptions outlined in the previous MGR cost estimates and as further prescribed by DOE guidance

  13. The stable model semantics under the any-world assumption

    OpenAIRE

    Straccia, Umberto; Loyer, Yann

    2004-01-01

    The stable model semantics has become a dominating approach to complete the knowledge provided by a logic program by means of the Closed World Assumption (CWA). The CWA asserts that any atom whose truth-value cannot be inferred from the facts and rules is supposed to be false. This assumption is orthogonal to the so-called the Open World Assumption (OWA), which asserts that every such atom's truth is supposed to be unknown. The topic of this paper is to be more fine-grained. Indeed, the objec...

  14. Compressing the hidden variable space of a qubit

    International Nuclear Information System (INIS)

    Montina, Alberto

    2011-01-01

    In previously exhibited hidden variable models of quantum state preparation and measurement, the number of continuous hidden variables describing the actual state of single realizations is never smaller than the quantum state manifold dimension. We introduce a simple model for a qubit whose hidden variable space is one-dimensional, i.e., smaller than the two-dimensional Bloch sphere. The hidden variable probability distributions associated with quantum states satisfy reasonable criteria of regularity. Possible generalizations of this shrinking to an N-dimensional Hilbert space are discussed.

  15. Zipf exponent of trajectory distribution in the hidden Markov model

    Science.gov (United States)

    Bochkarev, V. V.; Lerner, E. Yu

    2014-03-01

    This paper is the first step of generalization of the previously obtained full classification of the asymptotic behavior of the probability for Markov chain trajectories for the case of hidden Markov models. The main goal is to study the power (Zipf) and nonpower asymptotics of the frequency list of trajectories of hidden Markov frequencys and to obtain explicit formulae for the exponent of the power asymptotics. We consider several simple classes of hidden Markov models. We prove that the asymptotics for a hidden Markov model and for the corresponding Markov chain can be essentially different.

  16. Zipf exponent of trajectory distribution in the hidden Markov model

    International Nuclear Information System (INIS)

    Bochkarev, V V; Lerner, E Yu

    2014-01-01

    This paper is the first step of generalization of the previously obtained full classification of the asymptotic behavior of the probability for Markov chain trajectories for the case of hidden Markov models. The main goal is to study the power (Zipf) and nonpower asymptotics of the frequency list of trajectories of hidden Markov frequencys and to obtain explicit formulae for the exponent of the power asymptotics. We consider several simple classes of hidden Markov models. We prove that the asymptotics for a hidden Markov model and for the corresponding Markov chain can be essentially different

  17. Defining Quantum Control Flow

    OpenAIRE

    Ying, Mingsheng; Yu, Nengkun; Feng, Yuan

    2012-01-01

    A remarkable difference between quantum and classical programs is that the control flow of the former can be either classical or quantum. One of the key issues in the theory of quantum programming languages is defining and understanding quantum control flow. A functional language with quantum control flow was defined by Altenkirch and Grattage [\\textit{Proc. LICS'05}, pp. 249-258]. This paper extends their work, and we introduce a general quantum control structure by defining three new quantu...

  18. Can play be defined?

    DEFF Research Database (Denmark)

    Eichberg, Henning

    2015-01-01

    Can play be defined? There is reason to raise critical questions about the established academic demand that at phenomenon – also in humanist studies – should first of all be defined, i.e. de-lineated and by neat lines limited to a “little box” that can be handled. The following chapter develops....... Human beings can very well understand play – or whatever phenomenon in human life – without defining it....

  19. Clustering Multivariate Time Series Using Hidden Markov Models

    Directory of Open Access Journals (Sweden)

    Shima Ghassempour

    2014-03-01

    Full Text Available In this paper we describe an algorithm for clustering multivariate time series with variables taking both categorical and continuous values. Time series of this type are frequent in health care, where they represent the health trajectories of individuals. The problem is challenging because categorical variables make it difficult to define a meaningful distance between trajectories. We propose an approach based on Hidden Markov Models (HMMs, where we first map each trajectory into an HMM, then define a suitable distance between HMMs and finally proceed to cluster the HMMs with a method based on a distance matrix. We test our approach on a simulated, but realistic, data set of 1,255 trajectories of individuals of age 45 and over, on a synthetic validation set with known clustering structure, and on a smaller set of 268 trajectories extracted from the longitudinal Health and Retirement Survey. The proposed method can be implemented quite simply using standard packages in R and Matlab and may be a good candidate for solving the difficult problem of clustering multivariate time series with categorical variables using tools that do not require advanced statistic knowledge, and therefore are accessible to a wide range of researchers.

  20. Modelling and evaluation of surgical performance using hidden Markov models.

    Science.gov (United States)

    Megali, Giuseppe; Sinigaglia, Stefano; Tonet, Oliver; Dario, Paolo

    2006-10-01

    Minimally invasive surgery has become very widespread in the last ten years. Since surgeons experience difficulties in learning and mastering minimally invasive techniques, the development of training methods is of great importance. While the introduction of virtual reality-based simulators has introduced a new paradigm in surgical training, skill evaluation methods are far from being objective. This paper proposes a method for defining a model of surgical expertise and an objective metric to evaluate performance in laparoscopic surgery. Our approach is based on the processing of kinematic data describing movements of surgical instruments. We use hidden Markov model theory to define an expert model that describes expert surgical gesture. The model is trained on kinematic data related to exercises performed on a surgical simulator by experienced surgeons. Subsequently, we use this expert model as a reference model in the definition of an objective metric to evaluate performance of surgeons with different abilities. Preliminary results show that, using different topologies for the expert model, the method can be efficiently used both for the discrimination between experienced and novice surgeons, and for the quantitative assessment of surgical ability.

  1. Hidden acoustic information revealed by intentional nonlinearity

    Science.gov (United States)

    Dowling, David R.

    2017-11-01

    Acoustic waves are omnipresent in modern life and are well described by the linearized equations of fluid dynamics. Once generated, acoustic waves carry and collect information about their source and the environment through which they propagate, respectively, and this information may be retrieved by analyzing recordings of these waves. Because of this, acoustics is the primary means for observation, surveillance, reconnaissance, and remote sensing in otherwise opaque environments, such as the Earth's oceans and crust, and the interior of the human body. For such information-retrieval tasks, acoustic fields are nearly always interrogated within their recorded frequency range or bandwidth. However, this frequency-range restriction is not general; acoustic fields may also carry (hidden) information at frequencies outside their bandwidth. Although such a claim may seem counter intuitive, hidden acoustic-field information can be revealed by re-introducing a marquee trait of fluid dynamics: nonlinearity. In particular, an intentional quadratic nonlinearity - a form of intra-signal heterodyning - can be used to obtain acoustic field information at frequencies outside a recorded acoustic field's bandwidth. This quadratic nonlinearity enables a variety of acoustic remote sensing applications that were long thought to be impossible. In particular, it allows the detrimental effects of sparse recordings and random scattering to be suppressed when the original acoustic field has sufficient bandwidth. In this presentation, the topic is developed heuristically, with a just brief exposition of the relevant mathematics. Hidden acoustic field information is then revealed from simulated and measured acoustic fields in simple and complicated acoustic environments involving frequencies from a few Hertz to more than 100 kHz, and propagation distances from tens of centimeters to hundreds of kilometers. Sponsored by ONR, NAVSEA, and NSF.

  2. Recovering a hidden polarization by ghost polarimetry.

    Science.gov (United States)

    Janassek, Patrick; Blumenstein, Sébastien; Elsäßer, Wolfgang

    2018-02-15

    By exploiting polarization correlations of light from a broadband fiber-based amplified spontaneous emission source we succeed in reconstructing a hidden polarization in a ghost polarimetry experiment in close analogy to ghost imaging and ghost spectroscopy. Thereby, an original linear polarization state in the object arm of a Mach-Zehnder interferometer configuration which has been camouflaged by a subsequent depolarizer is recovered by correlating it with light from a reference beam. The variation of a linear polarizer placed inside the reference beam results in a Malus law type second-order intensity correlation with high contrast, thus measuring a ghost polarigram.

  3. Pruning Boltzmann networks and hidden Markov models

    DEFF Research Database (Denmark)

    Pedersen, Morten With; Stork, D.

    1996-01-01

    We present sensitivity-based pruning algorithms for general Boltzmann networks. Central to our methods is the efficient calculation of a second-order approximation to the true weight saliencies in a cross-entropy error. Building upon previous work which shows a formal correspondence between linear...... Boltzmann chains and hidden Markov models (HMMs), we argue that our method can be applied to HMMs as well. We illustrate pruning on Boltzmann zippers, which are equivalent to two HMMs with cross-connection links. We verify that our second-order approximation preserves the rank ordering of weight saliencies...

  4. Hidden Scale Invariance in Condensed Matter

    DEFF Research Database (Denmark)

    Dyre, J. C.

    2014-01-01

    . This means that the phase diagram becomes effectively one-dimensional with regard to several physical properties. Liquids and solids with isomorphs include most or all van der Waals bonded systems and metals, as well as weakly ionic or dipolar systems. On the other hand, systems with directional bonding...... (hydrogen bonds or covalent bonds) or strong Coulomb forces generally do not exhibit hidden scale invariance. The article reviews the theory behind this picture of condensed matter and the evidence for it coming from computer simulations and experiments...

  5. Uncovering the Hidden Costs of Offshoring

    DEFF Research Database (Denmark)

    Larsen, Marcus M.; Manning, Stephan; Pedersen, Torben

    2013-01-01

    This study investigates estimation errors due to hidden costs—the costs of implementation that are neglected in strategic decision-making processes—in the context of services offshoring. Based on data from the Offshoring Research Network, we find that decision makers are more likely to make cost......-estimation errors given increasing configuration and task complexity in captive offshoring and offshore outsourcing, respectively. Moreover, we show that experience and a strong orientation toward organizational design in the offshoring strategy reduce the cost-estimation errors that follow from complexity. Our...

  6. The hidden face of the petroleum

    International Nuclear Information System (INIS)

    Laurent, E.

    2006-02-01

    For the first time, a book reveals what that was hidden to the public opinions: why the petroleum crisis of 1973 what only a manipulation, an arrangement between the OPEC and the petroleum companies, why the data concerning the petroleum reserves are wrong and increased by the producers countries, how Washington used the Saudi petroleum weapon to create the Soviet Union fall, and why from march 2001 maps of the Iraq (where were drawn the future petroleum explorations) were working documents for the vice President Cheney and petroleum managers for the ''secret society''. (A.L.B.)

  7. Evolving the structure of hidden Markov Models

    DEFF Research Database (Denmark)

    won, K. J.; Prugel-Bennett, A.; Krogh, A.

    2006-01-01

    A genetic algorithm (GA) is proposed for finding the structure of hidden Markov Models (HMMs) used for biological sequence analysis. The GA is designed to preserve biologically meaningful building blocks. The search through the space of HMM structures is combined with optimization of the emission...... and transition probabilities using the classic Baum-Welch algorithm. The system is tested on the problem of finding the promoter and coding region of C. jejuni. The resulting HMM has a superior discrimination ability to a handcrafted model that has been published in the literature....

  8. The hidden costs of nuclear power

    International Nuclear Information System (INIS)

    Keough, C.

    1981-01-01

    The two basic hidden costs of nuclear power are public money and public health. Nuclear power appears to be economical because many of the costs of producins electricity in these plants are paid by the federal government. So, like it or not, the citizens are footing the bill with their taxes. Design and development of plants have been paid for with public money, and disposal and cleanup costs will also be paid in this manner. The economic and health costs associated with nuclear accidents are staggering

  9. Genetic Algorithms Principles Towards Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Nabil M. Hewahi

    2011-10-01

    Full Text Available In this paper we propose a general approach based on Genetic Algorithms (GAs to evolve Hidden Markov Models (HMM. The problem appears when experts assign probability values for HMM, they use only some limited inputs. The assigned probability values might not be accurate to serve in other cases related to the same domain. We introduce an approach based on GAs to find
    out the suitable probability values for the HMM to be mostly correct in more cases than what have been used to assign the probability values.

  10. I Assumed You Knew: Teaching Assumptions as Co-Equal to Observations in Scientific Work

    Science.gov (United States)

    Horodyskyj, L.; Mead, C.; Anbar, A. D.

    2016-12-01

    Introductory science curricula typically begin with a lesson on the "nature of science". Usually this lesson is short, built with the assumption that students have picked up this information elsewhere and only a short review is necessary. However, when asked about the nature of science in our classes, student definitions were often confused, contradictory, or incomplete. A cursory review of how the nature of science is defined in a number of textbooks is similarly inconsistent and excessively loquacious. With such confusion both from the student and teacher perspective, it is no surprise that students walk away with significant misconceptions about the scientific endeavor, which they carry with them into public life. These misconceptions subsequently result in poor public policy and personal decisions on issues with scientific underpinnings. We will present a new way of teaching the nature of science at the introductory level that better represents what we actually do as scientists. Nature of science lessons often emphasize the importance of observations in scientific work. However, they rarely mention and often hide the importance of assumptions in interpreting those observations. Assumptions are co-equal to observations in building models, which are observation-assumption networks that can be used to make predictions about future observations. The confidence we place in these models depends on whether they are assumption-dominated (hypothesis) or observation-dominated (theory). By presenting and teaching science in this manner, we feel that students will better comprehend the scientific endeavor, since making observations and assumptions and building mental models is a natural human behavior. We will present a model for a science lab activity that can be taught using this approach.

  11. Supporting calculations and assumptions for use in WESF safetyanalysis

    Energy Technology Data Exchange (ETDEWEB)

    Hey, B.E.

    1997-03-07

    This document provides a single location for calculations and assumptions used in support of Waste Encapsulation and Storage Facility (WESF) safety analyses. It also provides the technical details and bases necessary to justify the contained results.

  12. A framework for the organizational assumptions underlying safety culture

    International Nuclear Information System (INIS)

    Packer, Charles

    2002-01-01

    The safety culture of the nuclear organization can be addressed at the three levels of culture proposed by Edgar Schein. The industry literature provides a great deal of insight at the artefact and espoused value levels, although as yet it remains somewhat disorganized. There is, however, an overall lack of understanding of the assumption level of safety culture. This paper describes a possible framework for conceptualizing the assumption level, suggesting that safety culture is grounded in unconscious beliefs about the nature of the safety problem, its solution and how to organize to achieve the solution. Using this framework, the organization can begin to uncover the assumptions at play in its normal operation, decisions and events and, if necessary, engage in a process to shift them towards assumptions more supportive of a strong safety culture. (author)

  13. Psychopatholgy, fundamental assumptions and CD-4 T lymphocyte ...

    African Journals Online (AJOL)

    In addition, we explored whether psychopathology and negative fundamental assumptions in ... Method: Self-rating questionnaires to assess depressive symptoms, ... associated with all participants scoring in the positive range of the FA scale.

  14. The Immoral Assumption Effect: Moralization Drives Negative Trait Attributions.

    Science.gov (United States)

    Meindl, Peter; Johnson, Kate M; Graham, Jesse

    2016-04-01

    Jumping to negative conclusions about other people's traits is judged as morally bad by many people. Despite this, across six experiments (total N = 2,151), we find that multiple types of moral evaluations--even evaluations related to open-mindedness, tolerance, and compassion--play a causal role in these potentially pernicious trait assumptions. Our results also indicate that moralization affects negative-but not positive-trait assumptions, and that the effect of morality on negative assumptions cannot be explained merely by people's general (nonmoral) preferences or other factors that distinguish moral and nonmoral traits, such as controllability or desirability. Together, these results suggest that one of the more destructive human tendencies--making negative assumptions about others--can be caused by the better angels of our nature. © 2016 by the Society for Personality and Social Psychology, Inc.

  15. Idaho National Engineering Laboratory installation roadmap assumptions document

    International Nuclear Information System (INIS)

    1993-05-01

    This document is a composite of roadmap assumptions developed for the Idaho National Engineering Laboratory (INEL) by the US Department of Energy Idaho Field Office and subcontractor personnel as a key element in the implementation of the Roadmap Methodology for the INEL Site. The development and identification of these assumptions in an important factor in planning basis development and establishes the planning baseline for all subsequent roadmap analysis at the INEL

  16. Global Update and Trends of Hidden Hunger, 1995-2011: The Hidden Hunger Index

    Science.gov (United States)

    Stevens, Gretchen A.; Ezzati, Majid; Black, Robert E.; Kraemer, Klaus

    2015-01-01

    Background Deficiencies in essential vitamins and minerals–also termed hidden hunger–are pervasive and hold negative consequences for the cognitive and physical development of children. Methods This analysis evaluates the change in hidden hunger over time in the form of one composite indicator–the Hidden Hunger Index (HHI)–using an unweighted average of prevalence estimates from the Nutrition Impact Model Study for anemia due to iron deficiency, vitamin A deficiency, and stunting (used as a proxy indicator for zinc deficiency). Net changes from 1995–2011 and population weighted regional means for various time periods are measured. Findings Globally, hidden hunger improved (-6.7 net change in HHI) from 1995–2011. Africa was the only region to see a deterioration in hidden hunger (+1.9) over the studied time period; East Asia and the Pacific performed exceptionally well (-13.0), while other regions improved only slightly. Improvements in HHI were mostly due to reductions in zinc and vitamin A deficiencies, while anemia due to iron deficiency persisted and even increased. Interpretation This analysis is critical for informing and tracking the impact of policy and programmatic efforts to reduce micronutrient deficiencies, to advance the global nutrition agenda, and to achieve the Millennium Development Goals (MDGs). However, there remains an unmet need to invest in gathering frequent, nationally representative, high-quality micronutrient data as we renew our efforts to scale up nutrition, and as we enter the post-2015 development agenda. Funding Preparation of this manuscript was funded by Sight and Life. There was no funding involved in the study design, data collection, analysis, or decision to publish. PMID:26673631

  17. Global Update and Trends of Hidden Hunger, 1995-2011: The Hidden Hunger Index.

    Directory of Open Access Journals (Sweden)

    Julie C Ruel-Bergeron

    Full Text Available Deficiencies in essential vitamins and minerals-also termed hidden hunger-are pervasive and hold negative consequences for the cognitive and physical development of children.This analysis evaluates the change in hidden hunger over time in the form of one composite indicator-the Hidden Hunger Index (HHI-using an unweighted average of prevalence estimates from the Nutrition Impact Model Study for anemia due to iron deficiency, vitamin A deficiency, and stunting (used as a proxy indicator for zinc deficiency. Net changes from 1995-2011 and population weighted regional means for various time periods are measured.Globally, hidden hunger improved (-6.7 net change in HHI from 1995-2011. Africa was the only region to see a deterioration in hidden hunger (+1.9 over the studied time period; East Asia and the Pacific performed exceptionally well (-13.0, while other regions improved only slightly. Improvements in HHI were mostly due to reductions in zinc and vitamin A deficiencies, while anemia due to iron deficiency persisted and even increased.This analysis is critical for informing and tracking the impact of policy and programmatic efforts to reduce micronutrient deficiencies, to advance the global nutrition agenda, and to achieve the Millennium Development Goals (MDGs. However, there remains an unmet need to invest in gathering frequent, nationally representative, high-quality micronutrient data as we renew our efforts to scale up nutrition, and as we enter the post-2015 development agenda.Preparation of this manuscript was funded by Sight and Life. There was no funding involved in the study design, data collection, analysis, or decision to publish.

  18. Hidden in plain sight: the formal, informal, and hidden curricula of a psychiatry clerkship.

    Science.gov (United States)

    Wear, Delese; Skillicorn, Jodie

    2009-04-01

    To examine perceptions of the formal, informal, and hidden curricula in psychiatry as they are observed and experienced by (1) attending physicians who have teaching responsibilities for residents and medical students, (2) residents who are taught by those same physicians and who have teaching responsibilities for medical students, and (3) medical students who are taught by attendings and residents during their psychiatry rotation. From June to November 2007, the authors conducted focus groups with attendings, residents, and students in one midwestern academic setting. The sessions were audiotaped, transcribed, and analyzed for themes surrounding the formal, informal, and hidden curricula. All three groups offered a similar belief that the knowledge, skills, and values of the formal curriculum focused on building relationships. Similarly, all three suggested that elements of the informal and hidden curricula were expressed primarily as the values arising from attendings' role modeling, as the nature and amount of time attendings spend with patients, and as attendings' advice arising from experience and intuition versus "textbook learning." Whereas students and residents offered negative values arising from the informal and hidden curricula, attendings did not, offering instead the more positive values they intended to encourage through the informal and hidden curricula. The process described here has great potential in local settings across all disciplines. Asking teachers and learners in any setting to think about how they experience the educational environment and what sense they make of all curricular efforts can provide a reality check for educators and a values check for learners as they critically reflect on the meanings of what they are learning.

  19. System Energy Assessment (SEA, Defining a Standard Measure of EROI for Energy Businesses as Whole Systems

    Directory of Open Access Journals (Sweden)

    Jay Zarnikau

    2011-10-01

    Full Text Available A more objective method for measuring the energy needs of businesses, System Energy Assessment (SEA, measures the combined impacts of material supply chains and service supply chains, to assess businesses as whole self-managing net-energy systems. The method is demonstrated using a model Wind Farm, and defines a physical measure of their energy productivity for society (EROI-S, a ratio of total energy delivered to total energy expended. Energy use records for technology and proxy measures for clearly understood but not individually recorded energy uses for services are combined for a whole system estimate of consumption required for production. Current methods count only energy needs for technology. Business services outsource their own energy needs to operate, leaving no traceable record. That uncounted business energy demand is often 80% of the total, an amount of “dark energy” hidden from view, discovered by finding the average energy estimated needs for businesses far below the world average energy consumed per dollar of GDP. Presently for lack of information the energy needs of business services are counted to be “0”. Our default assumption is to treat them as “average”. The result is a hard measure of total business demand for energy services, a “Scope 4” energy use or GHG impact assessment. Counting recorded energy uses and discounting unrecorded ones misrepresents labor intensive work as highly energy efficient. The result confirms a similar finding by Hall et al. in 1981 [1]. We use exhaustive search for what a business needs to operate as a whole, tracing internal business relationships rather than energy data, to locate its natural physical boundary as a working unit, and so define a business as a physical rather than statistical subject of scientific study. See also online resource materials and notes [2].

  20. Atlas of solar hidden photon emission

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, Javier [Departamento de Física Teórica, Universidad de Zaragoza,Pedro Cerbuna 12, E-50009, Zaragoza (Spain); Max-Planck-Institut für Physik, Werner-Heisenberg-Institut,Föhringer Ring 6, 80805 München (Germany)

    2015-07-20

    Hidden photons, gauge bosons of a U(1) symmetry of a hidden sector, can constitute the dark matter of the universe and a smoking gun for large volume compactifications of string theory. In the sub-eV mass range, a possible discovery experiment consists on searching the copious flux of these particles emitted from the Sun in a helioscope setup à la Sikivie. In this paper, we compute in great detail the flux of HPs from the Sun, a necessary ingredient for interpreting such experiments. We provide a detailed exposition of transverse photon-HP oscillations in inhomogenous media, with special focus on resonance oscillations, which play a leading role in many cases. The region of the Sun emitting HPs resonantly is a thin spherical shell for which we justify an averaged-emission formula and which implies a distinctive morphology of the angular distribution of HPs on Earth in many cases. Low mass HPs with energies in the visible and IR have resonances very close to the photosphere where the solar plasma is not fully ionised and requires building a detailed model of solar refraction and absorption. We present results for a broad range of HP masses (from 0–1 keV) and energies (from the IR to the X-ray range), the most complete atlas of solar HP emission to date.

  1. Atlas of solar hidden photon emission

    Energy Technology Data Exchange (ETDEWEB)

    Redondo, Javier, E-mail: redondo@mpp.mpg.de [Departamento de Física Teórica, Universidad de Zaragoza, Pedro Cerbuna 12, E-50009, Zaragoza, España (Spain)

    2015-07-01

    Hidden photons, gauge bosons of a U(1) symmetry of a hidden sector, can constitute the dark matter of the universe and a smoking gun for large volume compactifications of string theory. In the sub-eV mass range, a possible discovery experiment consists on searching the copious flux of these particles emitted from the Sun in a helioscope setup à la Sikivie. In this paper, we compute in great detail the flux of HPs from the Sun, a necessary ingredient for interpreting such experiments. We provide a detailed exposition of transverse photon-HP oscillations in inhomogenous media, with special focus on resonance oscillations, which play a leading role in many cases. The region of the Sun emitting HPs resonantly is a thin spherical shell for which we justify an averaged-emission formula and which implies a distinctive morphology of the angular distribution of HPs on Earth in many cases. Low mass HPs with energies in the visible and IR have resonances very close to the photosphere where the solar plasma is not fully ionised and requires building a detailed model of solar refraction and absorption. We present results for a broad range of HP masses (from 0–1 keV) and energies (from the IR to the X-ray range), the most complete atlas of solar HP emission to date.

  2. Bayesian structural inference for hidden processes

    Science.gov (United States)

    Strelioff, Christopher C.; Crutchfield, James P.

    2014-04-01

    We introduce a Bayesian approach to discovering patterns in structurally complex processes. The proposed method of Bayesian structural inference (BSI) relies on a set of candidate unifilar hidden Markov model (uHMM) topologies for inference of process structure from a data series. We employ a recently developed exact enumeration of topological ɛ-machines. (A sequel then removes the topological restriction.) This subset of the uHMM topologies has the added benefit that inferred models are guaranteed to be ɛ-machines, irrespective of estimated transition probabilities. Properties of ɛ-machines and uHMMs allow for the derivation of analytic expressions for estimating transition probabilities, inferring start states, and comparing the posterior probability of candidate model topologies, despite process internal structure being only indirectly present in data. We demonstrate BSI's effectiveness in estimating a process's randomness, as reflected by the Shannon entropy rate, and its structure, as quantified by the statistical complexity. We also compare using the posterior distribution over candidate models and the single, maximum a posteriori model for point estimation and show that the former more accurately reflects uncertainty in estimated values. We apply BSI to in-class examples of finite- and infinite-order Markov processes, as well to an out-of-class, infinite-state hidden process.

  3. Hidden Markov Model for Stock Selection

    Directory of Open Access Journals (Sweden)

    Nguyet Nguyen

    2015-10-01

    Full Text Available The hidden Markov model (HMM is typically used to predict the hidden regimes of observation data. Therefore, this model finds applications in many different areas, such as speech recognition systems, computational molecular biology and financial market predictions. In this paper, we use HMM for stock selection. We first use HMM to make monthly regime predictions for the four macroeconomic variables: inflation (consumer price index (CPI, industrial production index (INDPRO, stock market index (S&P 500 and market volatility (VIX. At the end of each month, we calibrate HMM’s parameters for each of these economic variables and predict its regimes for the next month. We then look back into historical data to find the time periods for which the four variables had similar regimes with the forecasted regimes. Within those similar periods, we analyze all of the S&P 500 stocks to identify which stock characteristics have been well rewarded during the time periods and assign scores and corresponding weights for each of the stock characteristics. A composite score of each stock is calculated based on the scores and weights of its features. Based on this algorithm, we choose the 50 top ranking stocks to buy. We compare the performances of the portfolio with the benchmark index, S&P 500. With an initial investment of $100 in December 1999, over 15 years, in December 2014, our portfolio had an average gain per annum of 14.9% versus 2.3% for the S&P 500.

  4. Hidden ion population of the magnetosphere

    International Nuclear Information System (INIS)

    Olsen, R.C.

    1982-01-01

    Particle data from two geosynchronous satellites (Applied Technology Satellite 6 and SCATHA) show a normally hidden ion population appearing when the satellites are in the earth's shadow. Ion and electron data show the spacecraft potential dropping from +10 V in sunlight to +4 and +5 V in eclipse at local midnight, in low-energy (T/sub e/ -2 ), isotropic ion population appears which was invisible in sunlight because of the larger positive spacecraft potential. Higher-energy populations generally cover the tails of the hidden ion populations, so they cannot be inferred from daylight data. The isotropic populations appears only in a few percent of the spacecraft eclipse events, appearing only at times of low Kp (2 or less, preceded by a day with Σ Kp< or =20). A low-energy (T = 1--2 eV) field-aligned population often appears with and without the isotropic population, at slightly higher flux levels. These fluxes are visible in sunlight, but again the distribution functions obtained in eclipse differ from those that would be inferred from daylight data. Measurement of the thermal plasma population on a consistent basis, particularly in the plasma sheet, will require some method of controlling the detector potential with respect to the ambient plamsa

  5. ESO's Hidden Treasures Brought to Light

    Science.gov (United States)

    2011-01-01

    ESO's Hidden Treasures 2010 astrophotography competition attracted nearly 100 entries, and ESO is delighted to announce the winners. Hidden Treasures gave amateur astronomers the opportunity to search ESO's vast archives of astronomical data for a well-hidden cosmic gem. Astronomy enthusiast Igor Chekalin from Russia won the first prize in this difficult but rewarding challenge - the trip of a lifetime to ESO's Very Large Telescope at Paranal, Chile. The pictures of the Universe that can be seen in ESO's releases are impressive. However, many hours of skilful work are required to assemble the raw greyscale data captured by the telescopes into these colourful images, correcting them for distortions and unwanted signatures of the instrument, and enhancing them so as to bring out the details contained in the astronomical data. ESO has a team of professional image processors, but for the ESO's Hidden Treasures 2010 competition, the experts decided to give astronomy and photography enthusiasts the opportunity to show the world what they could do with the mammoth amount of data contained in ESO's archives. The enthusiasts who responded to the call submitted nearly 100 entries in total - far exceeding initial expectations, given the difficult nature of the challenge. "We were completely taken aback both by the quantity and the quality of the images that were submitted. This was not a challenge for the faint-hearted, requiring both an advanced knowledge of data processing and an artistic eye. We are thrilled to have discovered so many talented people," said Lars Lindberg Christensen, Head of ESO's education and Public Outreach Department. Digging through many terabytes of professional astronomical data, the entrants had to identify a series of greyscale images of a celestial object that would reveal the hidden beauty of our Universe. The chance of a great reward for the lucky winner was enough to spur on the competitors; the first prize being a trip to ESO's Very Large

  6. Epitope discovery with phylogenetic hidden Markov models.

    LENUS (Irish Health Repository)

    Lacerda, Miguel

    2010-05-01

    Existing methods for the prediction of immunologically active T-cell epitopes are based on the amino acid sequence or structure of pathogen proteins. Additional information regarding the locations of epitopes may be acquired by considering the evolution of viruses in hosts with different immune backgrounds. In particular, immune-dependent evolutionary patterns at sites within or near T-cell epitopes can be used to enhance epitope identification. We have developed a mutation-selection model of T-cell epitope evolution that allows the human leukocyte antigen (HLA) genotype of the host to influence the evolutionary process. This is one of the first examples of the incorporation of environmental parameters into a phylogenetic model and has many other potential applications where the selection pressures exerted on an organism can be related directly to environmental factors. We combine this novel evolutionary model with a hidden Markov model to identify contiguous amino acid positions that appear to evolve under immune pressure in the presence of specific host immune alleles and that therefore represent potential epitopes. This phylogenetic hidden Markov model provides a rigorous probabilistic framework that can be combined with sequence or structural information to improve epitope prediction. As a demonstration, we apply the model to a data set of HIV-1 protein-coding sequences and host HLA genotypes.

  7. Pentaquarks with hidden charm as hadroquarkonia

    Energy Technology Data Exchange (ETDEWEB)

    Eides, Michael I. [University of Kentucky, Department of Physics and Astronomy, Lexington, KY (United States); Petersburg Nuclear Physics Institute, St. Petersburg (Russian Federation); Petrov, Victor Yu. [Petersburg Nuclear Physics Institute, St. Petersburg (Russian Federation); Polyakov, Maxim V. [Petersburg Nuclear Physics Institute, St. Petersburg (Russian Federation); Ruhr-Universitaet Bochum, Institut fuer Theoretische Physik II, Bochum (Germany)

    2018-01-15

    We consider hidden charm pentaquarks as hadroquarkonium states in a QCD inspired approach. Pentaquarks arise naturally as bound states of quarkonia excitations and ordinary baryons. The LHCb P{sub c}(4450) pentaquark is interpreted as a ψ{sup '}-nucleon bound state with spin-parity J{sup P} = 3/2{sup -}. The partial decay width Γ(P{sub c}(4450) → J/ψ + N) ∼ 11 MeV is calculated and turned out to be in agreement with the experimental data for P{sub c}(4450). The P{sub c}(4450) pentaquark is predicted to be a member of one of the two almost degenerate hidden-charm baryon octets with spin-parities J{sup P} = 1/2{sup -}, 3/2{sup -}. The masses and decay widths of the octet pentaquarks are calculated. The widths are small and comparable with the width of the P{sub c}(4450) pentaquark, and the masses of the octet pentaquarks satisfy the Gell-Mann-Okubo relation. Interpretation of pentaquarks as loosely bound Σ{sub c} anti D* and Σ{sub c}{sup *} anti D* deuteronlike states is also considered. We determine quantum numbers of these bound states and calculate their masses in the one-pion exchange scenario. The hadroquarkonium and molecular approaches to exotic hadrons are compared and the relative advantages and drawbacks of each approach are discussed. (orig.)

  8. Low energy theorems of hidden local symmetries

    International Nuclear Information System (INIS)

    Harada, Masayasu; Kugo, Taichiro; Yamawaki, Koichi.

    1994-01-01

    We prove to all orders of the loop expansion the low energy theorems of hidden local symmetries in four-dimensional nonlinear sigma models based on the coset space G/H, with G and H being arbitrary compact groups. Although the models are non-renormalizable, the proof is done in an analogous manner to the renormalization proof of gauge theories and two-dimensional nonlinear sigma models by restricting ourselves to the operators with two derivatives (counting a hidden gauge boson field as one derivative), i.e., with dimension 2, which are the only operators relevant to the low energy limit. Through loop-wise mathematical induction based on the Ward-Takahashi identity for the BRS symmetry, we solve renormalization equation for the effective action up to dimension-2 terms plus terms with the relevant BRS sources. We then show that all the quantum corrections to the dimension-2 operators, including the finite parts as well as the divergent ones, can be entirely absorbed into a re-definition (renormalization) of the parameters and the fields in the dimension-2 part of the tree-level Lagrangian. (author)

  9. Black holes, hidden symmetries, and complete integrability.

    Science.gov (United States)

    Frolov, Valeri P; Krtouš, Pavel; Kubizňák, David

    2017-01-01

    The study of higher-dimensional black holes is a subject which has recently attracted vast interest. Perhaps one of the most surprising discoveries is a realization that the properties of higher-dimensional black holes with the spherical horizon topology and described by the Kerr-NUT-(A)dS metrics are very similar to the properties of the well known four-dimensional Kerr metric. This remarkable result stems from the existence of a single object called the principal tensor. In our review we discuss explicit and hidden symmetries of higher-dimensional Kerr-NUT-(A)dS black hole spacetimes. We start with discussion of the Killing and Killing-Yano objects representing explicit and hidden symmetries. We demonstrate that the principal tensor can be used as a "seed object" which generates all these symmetries. It determines the form of the geometry, as well as guarantees its remarkable properties, such as special algebraic type of the spacetime, complete integrability of geodesic motion, and separability of the Hamilton-Jacobi, Klein-Gordon, and Dirac equations. The review also contains a discussion of different applications of the developed formalism and its possible generalizations.

  10. Hidden power system inflexibilities imposed by traditional unit commitment formulations

    International Nuclear Information System (INIS)

    Morales-España, Germán; Ramírez-Elizondo, Laura; Hobbs, Benjamin F.

    2017-01-01

    Highlights: • Quality and accuracy of traditional-energy- and power-based UCs are evaluated. • Real-time performance evaluation simulating “perfect” stochastic UCs. • Ideal energy-based stochastic UC formulations impose hidden system inflexibilities. • A deterministic power-based UC may outperform an ideal energy-based stochastic UC. • Power-based UC overcomes flaws of energy-based UC: lower cost and wind curtailment. - Abstract: Approximations made in traditional day-ahead unit commitment model formulations can result in suboptimal or even infeasible schedules for slow-start units and inaccurate predictions of actual costs and wind curtailment. With increasing wind penetration, these errors will become economically more significant. Here, we consider inaccuracies from three approximations: the use of hourly intervals in which energy production from each generator is modeled as being constant; the disregarding of startup and shutdown energy trajectories; and optimization based on expected wind profiles. The results of unit commitment formulations with those assumptions are compared to models that: (1) use a piecewise-linear power profiles of generation, load and wind, instead of the traditional stepwise energy profiles; (2) consider startup/shutdown trajectories; and (3) include many possible wind trajectories in a stochastic framework. The day-ahead hourly schedules of slow-start generators are then evaluated against actual wind and load profiles using a model real-time dispatch and quick-start unit commitment with a 5 min time step. We find that each simplification usually causes expected generation costs to increase by several percentage points, and results in significant understatement of expected wind curtailment and, in some cases, load interruptions. The inclusion of startup and shutdown trajectories often yielded the largest improvements in schedule performance.

  11. An introduction to hidden Markov models for biological sequences

    DEFF Research Database (Denmark)

    Krogh, Anders Stærmose

    1998-01-01

    A non-matematical tutorial on hidden Markov models (HMMs) plus a description of one of the applications of HMMs: gene finding.......A non-matematical tutorial on hidden Markov models (HMMs) plus a description of one of the applications of HMMs: gene finding....

  12. Searching for hidden sector in multiparticle production at LHC

    Directory of Open Access Journals (Sweden)

    Miguel-Angel Sanchis-Lozano

    2016-03-01

    Full Text Available We study the impact of a hidden sector beyond the Standard Model, e.g. a Hidden Valley model, on factorial moments and cumulants of multiplicity distributions in multiparticle production with a special emphasis on the prospects for LHC results.

  13. Hidden Agendas in Marriage: Affective and Longitudinal Dimensions.

    Science.gov (United States)

    Krokoff, Lowell J.

    1990-01-01

    Examines how couples' discussions of troublesome problems reveal hidden agendas (issues not directly discussed or explored). Finds disgust and contempt are at the core of both love and respect agendas for husbands and wives. Finds that wives' more than husbands' hidden agendas are directly predictive of how negatively they argue at home. (SR)

  14. Hidden symmetries in minimal five-dimensional supergravity

    International Nuclear Information System (INIS)

    Poessel, Markus; Silva, Sebastian

    2004-01-01

    We study the hidden symmetries arising in the dimensional reduction of d=5, N=2 supergravity to three dimensions. Extending previous partial results for the bosonic part, we give a derivation that includes fermionic terms, shedding light on the appearance of the local hidden symmetry SO(4) in the reduction

  15. Defining Overweight and Obesity

    Science.gov (United States)

    ... Micronutrient Malnutrition State and Local Programs Defining Adult Overweight and Obesity Recommend on Facebook Tweet Share Compartir ... weight for a given height is described as overweight or obese. Body Mass Index, or BMI, is ...

  16. Drinking Levels Defined

    Science.gov (United States)

    ... of Alcohol Consumption Alcohol's Effects on the Body Alcohol Use Disorder Fetal Alcohol Exposure Support & Treatment Alcohol Policy Special ... Definition of Drinking at Low Risk for Developing Alcohol Use Disorder (AUD): For women, low-risk drinking is defined ...

  17. Defining Documentary Film

    DEFF Research Database (Denmark)

    Juel, Henrik

    2006-01-01

    A discussion of various attemts at defining documentary film regarding form, content, truth, stile, genre or reception - and a propoposal of a positive list of essential, but non-exclusive characteristica of documentary film......A discussion of various attemts at defining documentary film regarding form, content, truth, stile, genre or reception - and a propoposal of a positive list of essential, but non-exclusive characteristica of documentary film...

  18. Abelian hidden sectors at a GeV

    International Nuclear Information System (INIS)

    Morrissey, David E.; Poland, David; Zurek, Kathryn M.

    2009-01-01

    We discuss mechanisms for naturally generating GeV-scale hidden sectors in the context of weak-scale supersymmetry. Such low mass scales can arise when hidden sectors are more weakly coupled to supersymmetry breaking than the visible sector, as happens when supersymmetry breaking is communicated to the visible sector by gauge interactions under which the hidden sector is uncharged, or if the hidden sector is sequestered from gravity-mediated supersymmetry breaking. We study these mechanisms in detail in the context of gauge and gaugino mediation, and present specific models of Abelian GeV-scale hidden sectors. In particular, we discuss kinetic mixing of a U(1) x gauge force with hypercharge, singlets or bi-fundamentals which couple to both sectors, and additional loop effects. Finally, we investigate the possible relevance of such sectors for dark matter phenomenology, as well as for low- and high-energy collider searches.

  19. Identifying hidden sexual bridging communities in Chicago.

    Science.gov (United States)

    Youm, Yoosik; Mackesy-Amiti, Mary Ellen; Williams, Chyvette T; Ouellet, Lawrence J

    2009-07-01

    Bridge populations can play a central role in the spread of human immunodeficiency virus (HIV) by providing transmission links between higher and lower prevalence populations. While social network methods are well suited to the study of bridge populations, analyses tend to focus on dyads (i.e., risk between drug and/or sex partners) and ignore bridges between distinct subpopulations. This study takes initial steps toward moving the analysis of sexual network linkages beyond individual and risk group levels to a community level in which Chicago's 77 community areas are examined as subpopulations for the purpose of identifying potential bridging communities. Of particular interest are "hidden" bridging communities; that is, areas with above-average levels of sexual ties with other areas but whose below-average AIDS prevalence may hide their potential importance for HIV prevention. Data for this analysis came from the first wave of recruiting at the Chicago Sexual Acquisition and Transmission of HIV Cooperative Agreement Program site. Between August 2005 through October 2006, respondent-driven sampling was used to recruit users of heroin, cocaine, or methamphetamine, men who have sex with men regardless of drug use, the sex partners of these two groups, and sex partners of the sex partners. In this cross-sectional study of the sexual transmission of HIV, participants completed a network-focused computer-assisted self-administered interview, which included questions about the geographic locations of sexual contacts with up to six recent partners. Bridging scores for each area were determined using a matrix representing Chicago's 77 community areas and were assessed using two measures: non-redundant ties and flow betweenness. Bridging measures and acquired immunodeficiency syndrome (AIDS) case prevalence rates were plotted for each community area on charts representing four conditions: below-average bridging and AIDS prevalence, below-average bridging and above

  20. Changing Assumptions and Progressive Change in Theories of Strategic Organization

    DEFF Research Database (Denmark)

    Foss, Nicolai J.; Hallberg, Niklas L.

    2017-01-01

    are often decoupled from the results of empirical testing, changes in assumptions seem closely intertwined with theoretical progress. Using the case of the resource-based view, we suggest that progressive change in theories of strategic organization may come about as a result of scholarly debate and dispute......A commonly held view is that strategic organization theories progress as a result of a Popperian process of bold conjectures and systematic refutations. However, our field also witnesses vibrant debates or disputes about the specific assumptions that our theories rely on, and although these debates...... over what constitutes proper assumptions—even in the absence of corroborating or falsifying empirical evidence. We also discuss how changing assumptions may drive future progress in the resource-based view....

  1. The Emperors sham - wrong assumption that sham needling is sham.

    Science.gov (United States)

    Lundeberg, Thomas; Lund, Iréne; Näslund, Jan; Thomas, Moolamanil

    2008-12-01

    During the last five years a large number of randomised controlled clinical trials (RCTs) have been published on the efficacy of acupuncture in different conditions. In most of these studies verum is compared with sham acupuncture. In general both verum and sham have been found to be effective, and often with little reported difference in outcome. This has repeatedly led to the conclusion that acupuncture is no more effective than placebo treatment. However, this conclusion is based on the assumption that sham acupuncture is inert. Since sham acupuncture evidently is merely another form of acupuncture from the physiological perspective, the assumption that sham is sham is incorrect and conclusions based on this assumption are therefore invalid. Clinical guidelines based on such conclusions may therefore exclude suffering patients from valuable treatments.

  2. Respondent-Driven Sampling – Testing Assumptions: Sampling with Replacement

    Directory of Open Access Journals (Sweden)

    Barash Vladimir D.

    2016-03-01

    Full Text Available Classical Respondent-Driven Sampling (RDS estimators are based on a Markov Process model in which sampling occurs with replacement. Given that respondents generally cannot be interviewed more than once, this assumption is counterfactual. We join recent work by Gile and Handcock in exploring the implications of the sampling-with-replacement assumption for bias of RDS estimators. We differ from previous studies in examining a wider range of sampling fractions and in using not only simulations but also formal proofs. One key finding is that RDS estimates are surprisingly stable even in the presence of substantial sampling fractions. Our analyses show that the sampling-with-replacement assumption is a minor contributor to bias for sampling fractions under 40%, and bias is negligible for the 20% or smaller sampling fractions typical of field applications of RDS.

  3. Carelessness: A Hidden Doxa of Higher Education

    Science.gov (United States)

    Lynch, Kathleen

    2010-01-01

    This article explores the implications of new public sector "reforms" for the culture of higher education. It argues that a culture of carelessness, grounded in Cartesian rationalism, has been exacerbated by new managerialism. The article challenges a prevailing sociological assumption that the character of higher education culture is primarily…

  4. Implicit assumptions underlying simple harvest models of marine bird populations can mislead environmental management decisions.

    Science.gov (United States)

    O'Brien, Susan H; Cook, Aonghais S C P; Robinson, Robert A

    2017-10-01

    Assessing the potential impact of additional mortality from anthropogenic causes on animal populations requires detailed demographic information. However, these data are frequently lacking, making simple algorithms, which require little data, appealing. Because of their simplicity, these algorithms often rely on implicit assumptions, some of which may be quite restrictive. Potential Biological Removal (PBR) is a simple harvest model that estimates the number of additional mortalities that a population can theoretically sustain without causing population extinction. However, PBR relies on a number of implicit assumptions, particularly around density dependence and population trajectory that limit its applicability in many situations. Among several uses, it has been widely employed in Europe in Environmental Impact Assessments (EIA), to examine the acceptability of potential effects of offshore wind farms on marine bird populations. As a case study, we use PBR to estimate the number of additional mortalities that a population with characteristics typical of a seabird population can theoretically sustain. We incorporated this level of additional mortality within Leslie matrix models to test assumptions within the PBR algorithm about density dependence and current population trajectory. Our analyses suggest that the PBR algorithm identifies levels of mortality which cause population declines for most population trajectories and forms of population regulation. Consequently, we recommend that practitioners do not use PBR in an EIA context for offshore wind energy developments. Rather than using simple algorithms that rely on potentially invalid implicit assumptions, we recommend use of Leslie matrix models for assessing the impact of additional mortality on a population, enabling the user to explicitly define assumptions and test their importance. Copyright © 2017 Elsevier Ltd. All rights reserved.

  5. … To be hidden does not mean to be merely revealed – Part 1 Artistic research on hidden curriculum

    Directory of Open Access Journals (Sweden)

    Annette Krause

    2015-09-01

    Full Text Available This text revisits the long-term project Hidden Curriculum, initiated by Annette Krauss. The project addresses unquestioned routines, hierarchies of knowledge (part 1, and the role of the body in learning processes (part 2 from the perspective of secondary/high school education (in the research on a hidden curriculum. A deeper analysis of educational studies on the phenomenon of ‘hidden curriculum’ in relation to the feminist and critical pedagogies of bell hooks, Paulo Freire, and Jacques Rancière brings forward important insights generated through the artistic research within hidden curriculum. The aim of this text is to address academic canons, corporeality, and investigate everyday norms through revisiting the framework, results, and processes of the collaborative research into hidden curriculum with secondary high school students.

  6. Dynamic portfolio optimization across hidden market regimes

    DEFF Research Database (Denmark)

    Nystrup, Peter; Madsen, Henrik; Lindström, Erik

    2017-01-01

    Regime-based asset allocation has been shown to add value over rebalancing to static weights and, in particular, reduce potential drawdowns by reacting to changes in market conditions. The predominant approach in previous studies has been to specify in advance a static decision rule for changing...... the allocation based on the state of financial markets or the economy. In this article, model predictive control (MPC) is used to dynamically optimize a portfolio based on forecasts of the mean and variance of financial returns from a hidden Markov model with time-varying parameters. There are computational...... than a buy-and-hold investment in various major stock market indices. This is after accounting for transaction costs, with a one-day delay in the implementation of allocation changes, and with zero-interest cash as the only alternative to the stock indices. Imposing a trading penalty that reduces...

  7. Supersymmetric leptogenesis with a light hidden sector

    International Nuclear Information System (INIS)

    De Simone, Andrea

    2010-04-01

    Supersymmetric scenarios incorporating thermal leptogenesis as the origin of the observed matter-antimatter asymmetry generically predict abundances of the primordial elements which are in conflict with observations. In this paper we pro- pose a simple way to circumvent this tension and accommodate naturally ther- mal leptogenesis and primordial nucleosynthesis. We postulate the existence of a light hidden sector, coupled very weakly to the Minimal Supersymmetric Standard Model, which opens up new decay channels for the next-to-lightest supersymmetric particle, thus diluting its abundance during nucleosynthesis. We present a general model-independent analysis of this mechanism as well as two concrete realizations, and describe the relevant cosmological and astrophysical bounds and implications for this dark matter scenario. Possible experimental signatures at colliders and in cosmic-ray observations are also discussed. (orig.)

  8. Nuclear scissors modes and hidden angular momenta

    Energy Technology Data Exchange (ETDEWEB)

    Balbutsev, E. B., E-mail: balbuts@theor.jinr.ru; Molodtsova, I. V. [Joint Institute for Nuclear Research (Russian Federation); Schuck, P. [Université Paris-Sud, Institut de Physique Nucléaire, IN2P3–CNRS (France)

    2017-01-15

    The coupled dynamics of low-lying modes and various giant resonances are studied with the help of the Wigner Function Moments method generalized to take into account spin degrees of freedom and pair correlations simultaneously. The method is based on Time-Dependent Hartree–Fock–Bogoliubov equations. The model of the harmonic oscillator including spin–orbit potential plus quadrupole–quadrupole and spin–spin interactions is considered. New low-lying spin-dependent modes are analyzed. Special attention is paid to the scissors modes. A new source of nuclear magnetism, connected with counter-rotation of spins up and down around the symmetry axis (hidden angular momenta), is discovered. Its inclusion into the theory allows one to improve substantially the agreement with experimental data in the description of energies and transition probabilities of scissors modes.

  9. Neuroevolution Mechanism for Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Nabil M. Hewahi

    2011-12-01

    Full Text Available Hidden Markov Model (HMM is a statistical model based on probabilities. HMM is becoming one of the major models involved in many applications such as natural language
    processing, handwritten recognition, image processing, prediction systems and many more. In this research we are concerned with finding out the best HMM for a certain application domain. We propose a neuroevolution process that is based first on converting the HMM to a neural network, then generating many neural networks at random where each represents a HMM. We proceed by
    applying genetic operators to obtain new set of neural networks where each represents HMMs, and updating the population. Finally select the best neural network based on a fitness function.

  10. The elliptic genus and Hidden symmetry

    International Nuclear Information System (INIS)

    Jaffe, A.

    2001-01-01

    We study the elliptic genus (a partition function) in certain interacting, twist quantum field theories. Without twists, these theories have N=2 supersymmetry. The twists provide a regularization, and also partially break the supersymmetry. In spite of the regularization, one can establish a homotopy of the elliptic genus in a coupling parameter. Our construction relies on a priori estimates and other methods from constructive quantum field theory; this mathematical underpinning allows us to justify evaluating the elliptic genus at one endpoint of the homotopy. We obtain a version of Witten's proposed formula for the elliptic genus in terms of classical theta functions. As a consequence, the elliptic genus has a hidden SL(2,Z) symmetry characteristic of conformal theory, even though the underlying theory is not conformal. (orig.)

  11. Hidden conformal symmetry of extremal black holes

    International Nuclear Information System (INIS)

    Chen Bin; Long Jiang; Zhang Jiaju

    2010-01-01

    We study the hidden conformal symmetry of extremal black holes. We introduce a new set of conformal coordinates to write the SL(2,R) generators. We find that the Laplacian of the scalar field in many extremal black holes, including Kerr(-Newman), Reissner-Nordstrom, warped AdS 3 , and null warped black holes, could be written in terms of the SL(2,R) quadratic Casimir. This suggests that there exist dual conformal field theory (CFT) descriptions of these black holes. From the conformal coordinates, the temperatures of the dual CFTs could be read directly. For the extremal black hole, the Hawking temperature is vanishing. Correspondingly, only the left (right) temperature of the dual CFT is nonvanishing, and the excitations of the other sector are suppressed. In the probe limit, we compute the scattering amplitudes of the scalar off the extremal black holes and find perfect agreement with the CFT prediction.

  12. Exact solution of the hidden Markov processes

    Science.gov (United States)

    Saakian, David B.

    2017-11-01

    We write a master equation for the distributions related to hidden Markov processes (HMPs) and solve it using a functional equation. Thus the solution of HMPs is mapped exactly to the solution of the functional equation. For a general case the latter can be solved only numerically. We derive an exact expression for the entropy of HMPs. Our expression for the entropy is an alternative to the ones given before by the solution of integral equations. The exact solution is possible because actually the model can be considered as a generalized random walk on a one-dimensional strip. While we give the solution for the two second-order matrices, our solution can be easily generalized for the L values of the Markov process and M values of observables: We should be able to solve a system of L functional equations in the space of dimension M -1 .

  13. DDH-Like Assumptions Based on Extension Rings

    DEFF Research Database (Denmark)

    Cramer, Ronald; Damgård, Ivan Bjerre; Kiltz, Eike

    2012-01-01

    We introduce and study a new type of DDH-like assumptions based on groups of prime order q. Whereas standard DDH is based on encoding elements of $\\mathbb{F}_{q}$ “in the exponent” of elements in the group, we ask what happens if instead we put in the exponent elements of the extension ring $R_f=......-Reingold style pseudorandom functions, and auxiliary input secure encryption. This can be seen as an alternative to the known family of k-LIN assumptions....

  14. Emerging Assumptions About Organization Design, Knowledge And Action

    Directory of Open Access Journals (Sweden)

    Alan Meyer

    2013-12-01

    Full Text Available Participants in the Organizational Design Community’s 2013 Annual Conference faced the challenge of “making organization design knowledge actionable.”  This essay summarizes the opinions and insights participants shared during the conference.  I reflect on these ideas, connect them to recent scholarly thinking about organization design, and conclude that seeking to make design knowledge actionable is nudging the community away from an assumption set based upon linearity and equilibrium, and toward a new set of assumptions based on emergence, self-organization, and non-linearity.

  15. Social exclusion, health and hidden homelessness.

    Science.gov (United States)

    Watson, J; Crawley, J; Kane, D

    2016-10-01

    Homelessness and poverty are extreme forms of social exclusion which extend beyond the lack of physical or material needs. The purpose of this study was to explore and expand the concept of social exclusion within the social determinants of health perspective - to understand how the social environment, health behaviours and health status are associated with material and social deprivation. Fundamental qualitative description with tones of focused ethnography. Participants who identified as hidden homeless described their everyday living conditions and how these everyday conditions were impacted and influenced by their social environments, coping/health behaviours and current health status. Research Ethics Board approval was granted and informed consents were obtained from 21 participants prior to the completion of individual interviews. Qualitative content analysis examined the descriptions of men and women experiencing hidden homelessness. Participants described the 'lack of quality social interactions and supports' and their 'daily struggles of street life'. They also shared the 'pain of addiction' and how coping strategies influenced health. Participants were hopeful that their insights would 'better the health of homeless people' by helping shape public policy and funding of community resources that would reduce barriers and improve overall health. Health professionals who understand health behaviours as coping mechanisms for poor quality social environments can provide more comprehensive and holistic care. The findings of this study can be used to support the importance of housing as a key factor in the health and well-being of people experiencing poverty, homelessness and social exclusion; and consequently, reinforces the need for a national housing strategy. Copyright © 2016 The Royal Society for Public Health. Published by Elsevier Ltd. All rights reserved.

  16. Skyrmions with holography and hidden local symmetry

    International Nuclear Information System (INIS)

    Nawa, Kanabu; Hosaka, Atsushi; Suganuma, Hideo

    2009-01-01

    We study baryons as Skyrmions in holographic QCD with D4/D8/D8 multi-D brane system in type IIA superstring theory, and also in the nonlinear sigma model with hidden local symmetry. Comparing these two models, we find that the extra dimension and its nontrivial curvature can largely change the role of (axial) vector mesons for baryons in four-dimensional space-time. In the hidden local symmetry approach, the ρ-meson field as a massive Yang-Mills field has a singular configuration in Skyrmion, which gives a strong repulsion for the baryon as a stabilizer. When the a 1 meson is added in this approach, the stability of Skyrmion is lost by the cancellation of ρ and a 1 contributions. On the contrary, in holographic QCD, the ρ-meson field does not appear as a massive Yang-Mills field due to the extra dimension and its nontrivial curvature. We show that the ρ-meson field has a regular configuration in Skyrmion, which gives a weak attraction for the baryon in holographic QCD. We argue that Skyrmion with π, ρ, and a 1 mesons become stable due to the curved extra dimension and also the presence of the Skyrme term in holographic QCD. From this result, we also discuss the features of our truncated-resonance analysis on baryon properties with π and ρ mesons below the cutoff scale M KK ∼1 GeV in holographic QCD, which is compared with other 5D instanton analysis.

  17. Building Secure Public Key Encryption Scheme from Hidden Field Equations

    Directory of Open Access Journals (Sweden)

    Yuan Ping

    2017-01-01

    Full Text Available Multivariate public key cryptography is a set of cryptographic schemes built from the NP-hardness of solving quadratic equations over finite fields, amongst which the hidden field equations (HFE family of schemes remain the most famous. However, the original HFE scheme was insecure, and the follow-up modifications were shown to be still vulnerable to attacks. In this paper, we propose a new variant of the HFE scheme by considering the special equation x2=x defined over the finite field F3 when x=0,1. We observe that the equation can be used to further destroy the special structure of the underlying central map of the HFE scheme. It is shown that the proposed public key encryption scheme is secure against known attacks including the MinRank attack, the algebraic attacks, and the linearization equations attacks. The proposal gains some advantages over the original HFE scheme with respect to the encryption speed and public key size.

  18. Mobile Application Identification based on Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Yang Xinyan

    2018-01-01

    Full Text Available With the increasing number of mobile applications, there has more challenging network management tasks to resolve. Users also face security issues of the mobile Internet application when enjoying the mobile network resources. Identifying applications that correspond to network traffic can help network operators effectively perform network management. The existing mobile application recognition technology presents new challenges in extensibility and applications with encryption protocols. For the existing mobile application recognition technology, there are two problems, they can not recognize the application which using the encryption protocol and their scalability is poor. In this paper, a mobile application identification method based on Hidden Markov Model(HMM is proposed to extract the defined statistical characteristics from different network flows generated when each application starting. According to the time information of different network flows to get the corresponding time series, and then for each application to be identified separately to establish the corresponding HMM model. Then, we use 10 common applications to test the method proposed in this paper. The test results show that the mobile application recognition method proposed in this paper has a high accuracy and good generalization ability.

  19. On the entropy of a hidden Markov process.

    Science.gov (United States)

    Jacquet, Philippe; Seroussi, Gadiel; Szpankowski, Wojciech

    2008-05-01

    We study the entropy rate of a hidden Markov process (HMP) defined by observing the output of a binary symmetric channel whose input is a first-order binary Markov process. Despite the simplicity of the models involved, the characterization of this entropy is a long standing open problem. By presenting the probability of a sequence under the model as a product of random matrices, one can see that the entropy rate sought is equal to a top Lyapunov exponent of the product. This offers an explanation for the elusiveness of explicit expressions for the HMP entropy rate, as Lyapunov exponents are notoriously difficult to compute. Consequently, we focus on asymptotic estimates, and apply the same product of random matrices to derive an explicit expression for a Taylor approximation of the entropy rate with respect to the parameter of the binary symmetric channel. The accuracy of the approximation is validated against empirical simulation results. We also extend our results to higher-order Markov processes and to Rényi entropies of any order.

  20. Basic problems solving for two-dimensional discrete 3 × 4 order hidden markov model

    International Nuclear Information System (INIS)

    Wang, Guo-gang; Gan, Zong-liang; Tang, Gui-jin; Cui, Zi-guan; Zhu, Xiu-chang

    2016-01-01

    A novel model is proposed to overcome the shortages of the classical hypothesis of the two-dimensional discrete hidden Markov model. In the proposed model, the state transition probability depends on not only immediate horizontal and vertical states but also on immediate diagonal state, and the observation symbol probability depends on not only current state but also on immediate horizontal, vertical and diagonal states. This paper defines the structure of the model, and studies the three basic problems of the model, including probability calculation, path backtracking and parameters estimation. By exploiting the idea that the sequences of states on rows or columns of the model can be seen as states of a one-dimensional discrete 1 × 2 order hidden Markov model, several algorithms solving the three questions are theoretically derived. Simulation results further demonstrate the performance of the algorithms. Compared with the two-dimensional discrete hidden Markov model, there are more statistical characteristics in the structure of the proposed model, therefore the proposed model theoretically can more accurately describe some practical problems.

  1. Evaluation of the Effects of Hidden Node Problems in IEEE 802.15.7 Uplink Performance.

    Science.gov (United States)

    Ley-Bosch, Carlos; Alonso-González, Itziar; Sánchez-Rodríguez, David; Ramírez-Casañas, Carlos

    2016-02-06

    In the last few years, the increasing use of LEDs in illumination systems has been conducted due to the emergence of Visible Light Communication (VLC) technologies, in which data communication is performed by transmitting through the visible band of the electromagnetic spectrum. In 2011, the Institute of Electrical and Electronics Engineers (IEEE) published the IEEE 802.15.7 standard for Wireless Personal Area Networks based on VLC. Due to limitations in the coverage of the transmitted signal, wireless networks can suffer from the hidden node problems, when there are nodes in the network whose transmissions are not detected by other nodes. This problem can cause an important degradation in communications when they are made by means of the Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) access control method, which is used in IEEE 802.15.7 This research work evaluates the effects of the hidden node problem in the performance of the IEEE 802.15.7 standard We implement a simulator and analyze VLC performance in terms of parameters like end-to-end goodput and message loss rate. As part of this research work, a solution to the hidden node problem is proposed, based on the use of idle patterns defined in the standard. Idle patterns are sent by the network coordinator node to communicate to the other nodes that there is an ongoing transmission. The validity of the proposed solution is demonstrated with simulation results.

  2. Definably compact groups definable in real closed fields. I

    OpenAIRE

    Barriga, Eliana

    2017-01-01

    We study definably compact definably connected groups definable in a sufficiently saturated real closed field $R$. We introduce the notion of group-generic point for $\\bigvee$-definable groups and show the existence of group-generic points for definably compact groups definable in a sufficiently saturated o-minimal expansion of a real closed field. We use this notion along with some properties of generic sets to prove that for every definably compact definably connected group $G$ definable in...

  3. Adaptive filtering for hidden node detection and tracking in networks.

    Science.gov (United States)

    Hamilton, Franz; Setzer, Beverly; Chavez, Sergio; Tran, Hien; Lloyd, Alun L

    2017-07-01

    The identification of network connectivity from noisy time series is of great interest in the study of network dynamics. This connectivity estimation problem becomes more complicated when we consider the possibility of hidden nodes within the network. These hidden nodes act as unknown drivers on our network and their presence can lead to the identification of false connections, resulting in incorrect network inference. Detecting the parts of the network they are acting on is thus critical. Here, we propose a novel method for hidden node detection based on an adaptive filtering framework with specific application to neuronal networks. We consider the hidden node as a problem of missing variables when model fitting and show that the estimated system noise covariance provided by the adaptive filter can be used to localize the influence of the hidden nodes and distinguish the effects of different hidden nodes. Additionally, we show that the sequential nature of our algorithm allows for tracking changes in the hidden node influence over time.

  4. Unraveling the hidden heterogeneities of breast cancer based on functional miRNA cluster.

    Directory of Open Access Journals (Sweden)

    Li Li

    Full Text Available It has become increasingly clear that the current taxonomy of clinical phenotypes is mixed with molecular heterogeneity, which potentially affects the treatment effect for involved patients. Defining the hidden molecular-distinct diseases using modern large-scale genomic approaches is therefore useful for refining clinical practice and improving intervention strategies. Given that microRNA expression profiling has provided a powerful way to dissect hidden genetic heterogeneity for complex diseases, the aim of the study was to develop a bioinformatics approach that identifies microRNA features leading to the hidden subtyping of complex clinical phenotypes. The basic strategy of the proposed method was to identify optimal miRNA clusters by iteratively partitioning the sample and feature space using the two-ways super-paramagnetic clustering technique. We evaluated the obtained optimal miRNA cluster by determining the consistency of co-expression and the chromosome location among the within-cluster microRNAs, and concluded that the optimal miRNA cluster could lead to a natural partition of disease samples. We applied the proposed method to a publicly available microarray dataset of breast cancer patients that have notoriously heterogeneous phenotypes. We obtained a feature subset of 13 microRNAs that could classify the 71 breast cancer patients into five subtypes with significantly different five-year overall survival rates (45%, 82.4%, 70.6%, 100% and 60% respectively; p = 0.008. By building a multivariate Cox proportional-hazards prediction model for the feature subset, we identified has-miR-146b as one of the most significant predictor (p = 0.045; hazard ratios = 0.39. The proposed algorithm is a promising computational strategy for dissecting hidden genetic heterogeneity for complex diseases, and will be of value for improving cancer diagnosis and treatment.

  5. Ontological, Epistemological and Methodological Assumptions: Qualitative versus Quantitative

    Science.gov (United States)

    Ahmed, Abdelhamid

    2008-01-01

    The review to follow is a comparative analysis of two studies conducted in the field of TESOL in Education published in "TESOL QUARTERLY." The aspects to be compared are as follows. First, a brief description of each study will be presented. Second, the ontological, epistemological and methodological assumptions underlying each study…

  6. Evaluating The Markov Assumption For Web Usage Mining

    DEFF Research Database (Denmark)

    Jespersen, S.; Pedersen, Torben Bach; Thorhauge, J.

    2003-01-01

    ) model~\\cite{borges99data}. These techniques typically rely on the \\textit{Markov assumption with history depth} $n$, i.e., it is assumed that the next requested page is only dependent on the last $n$ pages visited. This is not always valid, i.e. false browsing patterns may be discovered. However, to our...

  7. Interface Input/Output Automata: Splitting Assumptions from Guarantees

    DEFF Research Database (Denmark)

    Larsen, Kim Guldstrand; Nyman, Ulrik; Wasowski, Andrzej

    2006-01-01

    's \\IOAs [11], relying on a context dependent notion of refinement based on relativized language inclusion. There are two main contributions of the work. First, we explicitly separate assumptions from guarantees, increasing the modeling power of the specification language and demonstrating an interesting...

  8. Exploring five common assumptions on Attention Deficit Hyperactivity Disorder

    NARCIS (Netherlands)

    Batstra, Laura; Nieweg, Edo H.; Hadders-Algra, Mijna

    The number of children diagnosed with attention deficit hyperactivity disorder (ADHD) and treated with medication is steadily increasing. The aim of this paper was to critically discuss five debatable assumptions on ADHD that may explain these trends to some extent. These are that ADHD (i) causes

  9. Efficient pseudorandom generators based on the DDH assumption

    NARCIS (Netherlands)

    Rezaeian Farashahi, R.; Schoenmakers, B.; Sidorenko, A.; Okamoto, T.; Wang, X.

    2007-01-01

    A family of pseudorandom generators based on the decisional Diffie-Hellman assumption is proposed. The new construction is a modified and generalized version of the Dual Elliptic Curve generator proposed by Barker and Kelsey. Although the original Dual Elliptic Curve generator is shown to be

  10. Questioning Engelhardt's assumptions in Bioethics and Secular Humanism.

    Science.gov (United States)

    Ahmadi Nasab Emran, Shahram

    2016-06-01

    In Bioethics and Secular Humanism: The Search for a Common Morality, Tristram Engelhardt examines various possibilities of finding common ground for moral discourse among people from different traditions and concludes their futility. In this paper I will argue that many of the assumptions on which Engelhardt bases his conclusion about the impossibility of a content-full secular bioethics are problematic. By starting with the notion of moral strangers, there is no possibility, by definition, for a content-full moral discourse among moral strangers. It means that there is circularity in starting the inquiry with a definition of moral strangers, which implies that they do not share enough moral background or commitment to an authority to allow for reaching a moral agreement, and concluding that content-full morality is impossible among moral strangers. I argue that assuming traditions as solid and immutable structures that insulate people across their boundaries is problematic. Another questionable assumption in Engelhardt's work is the idea that religious and philosophical traditions provide content-full moralities. As the cardinal assumption in Engelhardt's review of the various alternatives for a content-full moral discourse among moral strangers, I analyze his foundationalist account of moral reasoning and knowledge and indicate the possibility of other ways of moral knowledge, besides the foundationalist one. Then, I examine Engelhardt's view concerning the futility of attempts at justifying a content-full secular bioethics, and indicate how the assumptions have shaped Engelhardt's critique of the alternatives for the possibility of content-full secular bioethics.

  11. Consequences of Violated Equating Assumptions under the Equivalent Groups Design

    Science.gov (United States)

    Lyren, Per-Erik; Hambleton, Ronald K.

    2011-01-01

    The equal ability distribution assumption associated with the equivalent groups equating design was investigated in the context of a selection test for admission to higher education. The purpose was to assess the consequences for the test-takers in terms of receiving improperly high or low scores compared to their peers, and to find strong…

  12. Measuring Productivity Change without Neoclassical Assumptions: A Conceptual Analysis

    NARCIS (Netherlands)

    B.M. Balk (Bert)

    2008-01-01

    textabstractThe measurement of productivity change (or difference) is usually based on models that make use of strong assumptions such as competitive behaviour and constant returns to scale. This survey discusses the basics of productivity measurement and shows that one can dispense with most if not

  13. Child Development Knowledge and Teacher Preparation: Confronting Assumptions.

    Science.gov (United States)

    Katz, Lilian G.

    This paper questions the widely held assumption that acquiring knowledge of child development is an essential part of teacher preparation and teaching competence, especially among teachers of young children. After discussing the influence of culture, parenting style, and teaching style on developmental expectations and outcomes, the paper asserts…

  14. The Metatheoretical Assumptions of Literacy Engagement: A Preliminary Centennial History

    Science.gov (United States)

    Hruby, George G.; Burns, Leslie D.; Botzakis, Stergios; Groenke, Susan L.; Hall, Leigh A.; Laughter, Judson; Allington, Richard L.

    2016-01-01

    In this review of literacy education research in North America over the past century, the authors examined the historical succession of theoretical frameworks on students' active participation in their own literacy learning, and in particular the metatheoretical assumptions that justify those frameworks. The authors used "motivation" and…

  15. Making Predictions about Chemical Reactivity: Assumptions and Heuristics

    Science.gov (United States)

    Maeyer, Jenine; Talanquer, Vicente

    2013-01-01

    Diverse implicit cognitive elements seem to support but also constrain reasoning in different domains. Many of these cognitive constraints can be thought of as either implicit assumptions about the nature of things or reasoning heuristics for decision-making. In this study we applied this framework to investigate college students' understanding of…

  16. Using Contemporary Art to Challenge Cultural Values, Beliefs, and Assumptions

    Science.gov (United States)

    Knight, Wanda B.

    2006-01-01

    Art educators, like many other educators born or socialized within the main-stream culture of a society, seldom have an opportunity to identify, question, and challenge their cultural values, beliefs, assumptions, and perspectives because school culture typically reinforces those they learn at home and in their communities (Bush & Simmons, 1990).…

  17. Does Artificial Neural Network Support Connectivism's Assumptions?

    Science.gov (United States)

    AlDahdouh, Alaa A.

    2017-01-01

    Connectivism was presented as a learning theory for the digital age and connectivists claim that recent developments in Artificial Intelligence (AI) and, more specifically, Artificial Neural Network (ANN) support their assumptions of knowledge connectivity. Yet, very little has been done to investigate this brave allegation. Does the advancement…

  18. Discourses and Theoretical Assumptions in IT Project Portfolio Management

    DEFF Research Database (Denmark)

    Hansen, Lars Kristian; Kræmmergaard, Pernille

    2014-01-01

    DISCOURSES AND THEORETICAL ASSUMPTIONS IN IT PROJECT PORTFOLIO MANAGEMENT: A REVIEW OF THE LITERATURE These years increasing interest is put on IT project portfolio management (IT PPM). Considering IT PPM an interdisciplinary practice, we conduct a concept-based literature review of relevant...

  19. 7 CFR 1980.476 - Transfer and assumptions.

    Science.gov (United States)

    2010-01-01

    ...-354 449-30 to recover its pro rata share of the actual loss at that time. In completing Form FmHA or... the lender on liquidations and property management. A. The State Director may approve all transfer and... Director will notify the Finance Office of all approved transfer and assumption cases on Form FmHA or its...

  20. Origins and Traditions in Comparative Education: Challenging Some Assumptions

    Science.gov (United States)

    Manzon, Maria

    2018-01-01

    This article questions some of our assumptions about the history of comparative education. It explores new scholarship on key actors and ways of knowing in the field. Building on the theory of the social constructedness of the field of comparative education, the paper elucidates how power shapes our scholarly histories and identities.

  1. Observing gravitational-wave transient GW150914 with minimal assumptions

    NARCIS (Netherlands)

    Abbott, B. P.; Abbott, R.; Abbott, T. D.; Abernathy, M. R.; Acernese, F.; Ackley, K.; Adams, C.; Phythian-Adams, A.T.; Addesso, P.; Adhikari, R. X.; Adya, V. B.; Affeldt, C.; Agathos, M.; Agatsuma, K.; Aggarwa, N.; Aguiar, O. D.; Aiello, L.; Ain, A.; Ajith, P.; Allen, B.; Allocca, A.; Altin, P. A.; Anderson, S. B.; Anderson, W. C.; Arai, K.; Araya, M. C.; Arceneaux, C. C.; Areeda, J. S.; Arnaud, N.; Arun, K. G.; Ascenzi, S.; Ashton, G.; Ast, M.; Aston, S. M.; Astone, P.; Aufmuth, P.; Aulbert, C.; Babak, S.; Bacon, P.; Bader, M. K. M.; Baker, P. T.; Baldaccini, F.; Ballardin, G.; Ballmer, S. W.; Barayoga, J. C.; Barclay, S. E.; Barish, B. C.; Barker, R.D.; Barone, F.; Barr, B.; Barsotti, L.; Barsuglia, M.; Barta, D.; Bartlett, J.; Bartos, I.; Bassiri, R.; Basti, A.; Batch, J. C.; Baune, C.; Bavigadda, V.; Bazzan, M.; Behnke, B.; Bejger, M.; Bell, A. S.; Bell, C. J.; Berger, B. K.; Bergman, J.; Bergmann, G.; Berry, C. P. L.; Bersanetti, D.; Bertolini, A.; Betzwieser, J.; Bhagwat, S.; Bhandare, R.; Bilenko, I. A.; Billingsley, G.; Birch, M.J.; Birney, R.; Biscans, S.; Bisht, A.; Bitossi, M.; Biwer, C.; Bizouard, M. A.; Blackburn, J. K.; Blackburn, L.; Blair, C. D.; Blair, D. G.; Blair, R. M.; Bloemen, A.L.S.; Bock, O.; Bodiya, T. P.; Boer, M.; Bogaert, J.G.; Bogan, C.; Bohe, A.; Bojtos, P.; Bond, T.C; Bondu, F.; Bonnand, R.; Boom, B. A.; Bork, R.; Boschi, V.; Bose, S.; Bouffanais, Y.; Bozzi, A.; Bradaschia, C.; Brady, P. R.; Braginsky, V. B.; Branchesi, M.; Brau, J. E.; Briant, T.; Brillet, A.; Brinkmann, M.; Brisson, V.; Brocki, P.; Brooks, A. F.; Brown, A.D.; Brown, D.; Brown, N. M.; Buchanan, C. C.; Buikema, A.; Bulik, T.; Bulten, H. J.; Buonanno, A.; Buskulic, D.; Buy, C.; Byer, R. L.; Cadonati, L.; Cagnoli, G.; Cahillane, C.; Calderon Bustillo, J.; Callister, T. A.; Calloni, E.; Camp, J. B.; Cannon, K. C.; Cao, J.; Capano, C. D.; Capocasa, E.; Carbognani, F.; Caride, S.; Diaz, J. Casanueva; Casentini, C.; Caudill, S.; Cavaglia, M.; Cavalier, F.; Cavalieri, R.; Cella, G.; Cepeda, C. B.; Baiardi, L. Cerboni; Cerretani, G.; Cesarini, E.; Chakraborty, R.; Chatterji, S.; Chalermsongsak, T.; Chamberlin, S. J.; Chan, M.; Chao, D. S.; Charlton, P.; Chassande-Mottin, E.; Chen, H. Y.; Chen, Y; Cheng, C.; Chincarini, A.; Chiummo, A.; Cho, H. S.; Cho, M.; Chow, J. H.; Christensen, N.; Chu, Qian; Chua, S. E.; Chung, E.S.; Ciani, G.; Clara, F.; Clark, J. A.; Clark, M.; Cleva, F.; Coccia, E.; Cohadon, P. -F.; Colla, A.; Collette, C. G.; Cominsky, L.; Constancio, M., Jr.; Conte, A.; Conti, L.; Cook, D.; Corbitt, T. R.; Cornish, N.; Corsi, A.; Cortese, S.; Costa, A.C.; Coughlin, M. W.; Coughlin, S. B.; Coulon, J. -P.; Countryman, S. T.; Couvares, P.; Cowan, E. E.; Coward, D. M.; Cowart, M. J.; Coyne, D. C.; Coyne, R.; Craig, K.; Creighton, J. D. E.; Cripe, J.; Crowder, S. G.; Cumming, A.; Cunningham, A.L.; Cuoco, E.; Dal Canton, T.; Danilishin, S. L.; D'Antonio, S.; Danzmann, K.; Darman, N. S.; Dattilo, V.; Dave, I.; Daveloza, H. P.; Davier, M.; Davies, G. S.; Daw, E. J.; Day, R.; Debra, D.; Debreczeni, G.; Degallaix, J.; De laurentis, M.; Deleglise, S.; Del Pozzo, W.; Denker, T.; Dent, T.; Dereli, H.; Dergachev, V.A.; DeRosa, R. T.; Rosa, R.; DeSalvo, R.; Dhurandhar, S.; Diaz, M. C.; Di Fiore, L.; Giovanni, M.G.; Di Lieto, A.; Di Pace, S.; Di Palma, I.; Di Virgilio, A.; Dojcinoski, G.; Dolique, V.; Donovan, F.; Dooley, K. L.; Doravari, S.; Douglas, R.; Downes, T. P.; Drago, M.; Drever, R. W. P.; Driggers, J. C.; Du, Z.; Ducrot, M.; Dwyer, S. E.; Edo, T. B.; Edwards, M. C.; Effler, A.; Eggenstein, H. -B.; Ehrens, P.; Eichholz, J.; Eikenberry, S. S.; Engels, W.; Essick, R. C.; Etzel, T.; Evans, T. M.; Evans, T. M.; Everett, R.; Factourovich, M.; Fafone, V.; Fair, H.; Fairhurst, S.; Fan, X.M.; Fang, Q.; Farinon, S.; Farr, B.; Farr, W. M.; Favata, M.; Fays, M.; Fehrmann, H.; Fejer, M. M.; Ferrante, I.; Ferreira, E. C.; Ferrini, F.; Fidecaro, F.; Fiori, I.; Fiorucci, D.; Fisher, R. R.; Flaminio, R.; Fletcher, M; Fournier, J. -D.; Franco, S; Frasca, S.; Frasconi, F.; Frei, Z.; Freise, A.; Frey, R.; Frey, V.; Fricke, T. T.; Fritsche, P.; Frolov, V. V.; Fulda, P.; Fyffe, M.; Gabbard, H. A. G.; Gair, J. R.; Gammaitoni, L.; Gaonkar, S. G.; Garufi, F.; Gatto, A.; Gaur, G.; Gehrels, N.; Gemme, G.; Gendre, B.; Genin, E.; Gennai, A.; George, J.; Gergely, L.; Germain, V.; Ghosh, Archisman; Ghosh, S.; Giaime, J. A.; Giardina, K. D.; Giazotto, A.; Gill, K.P.; Glaefke, A.; Goetz, E.; Goetz, R.; Gondan, L.; Gonzalez, Idelmis G.; Castro, J. M. Gonzalez; Gopakumar, A.; Gordon, N. A.; Gorodetsky, M. L.; Gossan, S. E.; Lee-Gosselin, M.; Gouaty, R.; Graef, C.; Graff, P. B.; Granata, M.; Grant, A.; Gras, S.; Gray, C.M.; Greco, G.; Green, A. C.; Groot, P.; Grote, H.; Grunewald, S.; Guidi, G. M.; Guo, X.; Gupta, A.; Gupta, M. K.; Gushwa, K. E.; Gustafson, E. K.; Gustafson, R.; de Haas, R.; Hacker, J. J.; Buffoni-Hall, R.; Hall, E. D.; Hammond, G.L.; Haney, M.; Hanke, M. M.; Hanks, J.; Hanna, C.; Hannam, M. D.; Hanson, P.J.; Hardwick, T.; Harms, J.; Harry, G. M.; Harry, I. W.; Hart, M. J.; Hartman, M. T.; Haster, C. -J.; Haughian, K.; Healy, J.; Heidmann, A.; Heintze, M. C.; Heitmann, H.; Hello, P.; Hemming, G.; Hendry, M.; Heng, I. S.; Hennig, J.; Heptonstall, A. W.; Heurs, M.; Hild, S.; Hinder, I.; Hoak, D.; Hodge, K. A.; Hofman, D.; Hollitt, S. E.; Holt, K.; Holz, D. E.; Hopkins, P.; Hosken, D. J.; Hough, J.; Houston, E. A.; Howell, E. J.; Hu, Y. M.; Huang, S.; Huerta, E. A.; Huet, D.; Hughey, B.; Husa, S.; Huttner, S. H.; Huynh-Dinh, T.; Idrisy, A.; Indik, N.; Ingram, D. R.; Inta, R.; Isa, H. N.; Isac, J. -M.; Isi, M.; Islas, G.; Isogai, T.; Iyer, B. R.; Izumi, K.; Jacqmin, T.; Jang, D.H.; Jani, K.; Jaranowski, P.; Jawahar, S.; Jimenez-Forteza, F.; Johnson, W.; Jones, I.D.; Jones, R.; Jonker, R. J. G.; Ju, L.; Haris, K.; Kalaghatgi, C. V.; Kalogera, V.; Kandhasamy, S.; Kang, G.H.; Kanner, J. B.; Karki, S.; Kasprzack, M.; Katsavounidis, E.; Katzman, W.; Kaufer, S.; Kaur, T.; Kawabe, K.; Kawazoe, F.; Kefelian, F.; Kehl, M. S.; Keitel, D.; Kelley, D. B.; Kells, W.; Kennedy, R.E.; Key, J. S.; Khalaidovski, A.; Khalili, F. Y.; Khan, I.; Khan., S.; Khan, Z.; Khazanov, E. A.; Kijhunchoo, N.; Kim, C.; Kim, J.; Kim, K.; Kim, Nam-Gyu; Kim, Namjun; Kim, Y.M.; King, E. J.; King, P. J.; Kinsey, M.; Kinzel, D. L.; Kissel, J. S.; Kleybolte, L.; Klimenko, S.; Koehlenbeck, S. M.; Kokeyama, K.; Koley, S.; Kondrashov, V.; Kontos, A.; Korobko, M.; Korth, W. Z.; Kowalska, I.; Kozak, D. B.; Kringel, V.; Krolak, A.; Krueger, C.; Kuehn, G.; Kumar, P.; Kuo, L.; Kutynia, A.; Lackey, B. D.; Laguna, P.; Landry, M.; Lange, J.; Lantz, B.; Lasky, P. D.; Lazzarini, A.; Lazzaro, C.; Leaci, R.; Leavey, S.; Lebigot, E. O.; Lee, C.H.; Lee, K.H.; Lee, M.H.; Lee, K.; Lenon, A.; Leonardi, M.; Leong, J. R.; Leroy, N.; Letendre, N.; Levin, Y.; Levine, B. M.; Li, T. G. F.; Libson, A.; Littenberg, T. B.; Lockerbie, N. A.; Logue, J.; Lombardi, A. L.; Lord, J. E.; Lorenzini, M.; Loriette, V.; Lormand, M.; Losurdo, G.; Lough, J. D.; Lueck, H.; Lundgren, A. P.; Luo, J.; Lynch, R.; Ma, Y.; MacDonald, T.T.; Machenschalk, B.; MacInnis, M.; Macleod, D. M.; Magana-Sandoval, F.; Magee, R. M.; Mageswaran, M.; Majorana, E.; Maksimovic, I.; Malvezzi, V.; Man, N.; Mandel, I.; Mandic, V.; Mangano, V.; Mansell, G. L.; Manske, M.; Mantovani, M.; Marchesoni, F.; Marion, F.; Marka, S.; Marka, Z.; Markosyan, A. S.; Maros, E.; Martelli, F.; Martellini, L.; Martin, I. W.; Martin, R.M.; Martynov, D. V.; Marx, J. N.; Mason, K.; Masserot, A.; Massinger, T. J.; Masso-Reid, M.; Matichard, F.; Matone, L.; Mavalvala, N.; Mazumder, N.; Mazzolo, G.; McCarthy, R.; McClelland, D. E.; McCormick, S.; McGuire, S. C.; McIntyre, G.; McIver, J.; McManus, D. J.; McWilliams, S. T.; Meacher, D.; Meadors, G. D.; Meidam, J.; Melatos, A.; Mende, G.; Mendoza-Gandara, D.; Mercer, R. A.; Merilh, E. L.; Merzougui, M.; Meshkov, S.; Messenger, C.; Messick, C.; Meyers, P. M.; Mezzani, F.; Miao, H.; Michel, C.; Middleton, H.; Mikhailov, E. E.; Milano, L.; Miller, J.; Millhouse, M.; Minenkov, Y.; Ming, J.; Mirshekari, S.; Mishra, C.; Mitra, S.; Mitrofanov, V. P.; Mitselmakher, G.; Mittleman, R.; Moggi, A.; Mohan, M.; Mohapatra, S. R. P.; Montani, M.; Moore, B.C.; Moore, J.C.; Moraru, D.; Gutierrez Moreno, M.; Morriss, S. R.; Mossavi, K.; Mours, B.; Mow-Lowry, C. M.; Mueller, C. L.; Mueller, G.; Muir, A. W.; Mukherjee, Arunava; Mukherjee, S.D.; Mukherjee, S.; Mukund, N.; Mullavey, A.; Munch, J.; Murphy, D. J.; Murray, P.G.; Mytidis, A.; Nardecchia, I.; Naticchioni, L.; Nayak, R. K.; Necula, V.; Nedkova, K.; Nelemans, G.; Gutierrez-Neri, M.; Neunzert, A.; Newton-Howes, G.; Nguyen, T. T.; Nielsen, A. B.; Nissanke, S.; Nitz, A.; Nocera, F.; Nolting, D.; Normandin, M. E. N.; Nuttall, L. K.; Oberling, J.; Ochsner, E.; O'Dell, J.; Oelker, E.; Ogin, G. H.; Oh, J.; Oh, S. H.; Ohme, F.; Oliver, M. B.; Oppermann, P.; Oram, Richard J.; O'Reilly, B.; O'Shaughnessy, R.; Ottaway, D. J.; Ottens, R. S.; Overmier, H.; Owen, B. J.; Pai, A.; Pai, S. A.; Palamos, J. R.; Palashov, O.; Palomba, C.; Pal-Singh, A.; Pan, H.; Pankow, C.; Pannarale, F.; Pant, B. C.; Paoletti, F.; Paoli, A.; Papa, M. A.; Page, J.; Paris, H. R.; Parker, W.S; Pascucci, D.; Pasqualetti, A.; Passaquieti, R.; Passuello, D.; Patricelli, B.; Patrick, Z.; Pearlstone, B. L.; Pedraza, M.; Pedurand, R.; Pekowsky, L.; Pele, A.; Penn, S.; Perreca, A.; Phelps, M.; Piccinni, O. J.; Pichot, M.; Piergiovanni, F.; Pierro, V.; Pillant, G.; Pinard, L.; Pinto, I. M.; Pitkin, M.; Poggiani, R.; Popolizio, P.; Post, A.; Powell, J.; Prasad, J.; Predoi, V.; Premachandra, S. S.; Prestegard, T.; Price, L. R.; Prijatelj, M.; Principe, M.; Privitera, S.; Prodi, G. A.; Prolchorov, L.; Puncken, O.; Punturo, M.; Puppo, P.; Puerrer, M.; Qi, H.; Qin, J.; Quetschke, V.; Quintero, E. A.; Quitzow-James, R.; Raab, F. J.; Rabeling, D. S.; Radkins, H.; Raffai, P.; Raja, S.; Rakhmanov, M.; Rapagnani, P.; Raymond, V.; Razzano, M.; Re, V.; Read, J.; Reed, C. M.; Regimbau, T.; Rei, L.; Reid, S.; Reitze, D. H.; Rew, H.; Reyes, S. D.; Ricci, F.; Riles, K.; Robertson, N. A.; Robie, R.; Robinet, F.; Rocchi, A.; Rolland, L.; Rollins, J. G.; Roma, V. J.; Romano, R.; Romanov, G.; Romie, J. H.; Rosinska, D.; Rowan, S.; Ruediger, A.; Ruggi, P.; Ryan, K.A.; Sachdev, P.S.; Sadecki, T.; Sadeghian, L.; Salconi, L.; Saleem, M.; Salemi, F.; Samajdar, A.; Sammut, L.; Sanchez, E. J.; Sandberg, V.; Sandeen, B.; Sanders, J. R.; Sassolas, B.; Sathyaprakash, B. S.; Saulson, P. R.; Sauter, O.; Savage, R. L.; Sawadsky, A.; Schale, P.; Schilling, R.; Schmidt, J; Schmidt, P.; Schnabel, R.B.; Schofield, R. M. S.; Schoenbeck, A.; Schreiber, K.E.C.; Schuette, D.; Schutz, B. F.; Scott, J.; Scott, M.S.; Sellers, D.; Sengupta, A. S.; Sentenac, D.; Sequino, V.; Sergeev, A.; Serna, G.; Setyawati, Y.; Sevigny, A.; Shaddock, D. A.; Shah, S.; Shithriar, M. S.; Shaltev, M.; Shao, Z.M.; Shapiro, B.; Shawhan, P.; Sheperd, A.; Shoemaker, D. H.; Shoemaker, D. M.; Siellez, K.; Siemens, X.; Sigg, D.; Silva, António Dias da; Simakov, D.; Singer, A; Singer, L. P.; Singh, A.; Singh, R.; Singhal, A.; Sintes, A. M.; Slagmolen, B. J. J.; Smith, R. J. E.; Smith, N.D.; Smith, R. J. E.; Son, E. J.; Sorazu, B.; Sorrentino, F.; Souradeep, T.; Srivastava, A. K.; Staley, A.; Steinke, M.; Steinlechner, J.; Steinlechner, S.; Steinmeyer, D.; Stephens, B. C.; Stone, J.R.; Strain, K. A.; Straniero, N.; Stratta, G.; Strauss, N. A.; Strigin, S. E.; Sturani, R.; Stuver, A. L.; Summerscales, T. Z.; Sun, L.; Sutton, P. J.; Swinkels, B. L.; Szczepanczyk, M. J.; Tacca, M.D.; Talukder, D.; Tanner, D. B.; Tapai, M.; Tarabrin, S. P.; Taracchini, A.; Taylor, W.R.; Theeg, T.; Thirugnanasambandam, M. P.; Thomas, E. G.; Thomas, M.; Thomas, P.; Thorne, K. A.; Thorne, K. S.; Thrane, E.; Tiwari, S.; Tiwari, V.; Tokmakov, K. V.; Tomlinson, C.; Tonelli, M.; Torres, C. V.; Torrie, C. I.; Toyra, D.; Travasso, F.; Traylor, G.; Trifiro, D.; Tringali, M. C.; Trozzo, L.; Tse, M.; Turconi, M.; Tuyenbayev, D.; Ugolini, D.; Unnikrishnan, C. S.; Urban, A. L.; Usman, S. A.; Vahlhruch, H.; Vajente, G.; Valdes, G.; Van Bakel, N.; Van Beuzekom, Martin; Van den Brand, J. F. J.; Van Den Broeck, C.F.F.; Vander-Hyde, D. C.; van der Schaaf, L.; van Heijningen, J. V.; van Veggel, A. A.; Vardaro, M.; Vass, S.; Vasuth, M.; Vaulin, R.; Vecchio, A.; Vedovato, G.; Veitch, J.; Veitch, R. J.; Venkateswara, K.; Verkindt, D.; Vetrano, F.; Vicere, A.; Vinciguerra, S.; Vine, D. J.; Vinet, J. -Y.; Vitale, S.; Vo, T.; Vocca, H.; Vorvick, C.; Voss, D. V.; Vousden, W. D.; Vyatchanin, S. P.; Wade, A. R.; Wade, L. E.; Wade, MT; Walker, M.; Wallace, L.; Walsh, S.; Wang, G.; Wang, H.; Wang, M.; Wang, X.; Wang, Y.; Ward, R. L.; Warner, J.; Was, M.; Weaver, B.; Wei, L. -W.; Weinert, M.; Weinstein, A. J.; Weiss, R.; Welborn, T.; Wen, L.M.; Wessels, P.; Westphal, T.; Wette, K.; Whelan, J. T.; White, D. J.; Whiting, B. F.; Williams, D.; Williams, D.R.; Williamson, A. R.; Willis, J. L.; Willke, B.; Wimmer, M. H.; Winkler, W.; Wipf, C. C.; Wittel, H.; Woan, G.; Worden, J.; Wright, J.L.; Wu, G.; Yablon, J.; Yam, W.; Yamamoto, H.; Yancey, C. C.; Yap, M. J.; Yu, H.; Yvert, M.; Zadrozny, A.; Zangrando, L.; Zanolin, M.; Zendri, J. -P.; Zevin, M.; Zhang, F.; Zhang, L.; Zhang, M.; Zhang, Y.; Zhao, C.; Zhou, M.; Zhou, Z.; Zhu, X. J.; Zucker, M. E.; Zuraw, S. E.; Zweizig, J.

    2016-01-01

    The gravitational-wave signal GW150914 was first identified on September 14, 2015, by searches for short-duration gravitational-wave transients. These searches identify time-correlated transients in multiple detectors with minimal assumptions about the signal morphology, allowing them to be

  2. Deep Borehole Field Test Requirements and Controlled Assumptions.

    Energy Technology Data Exchange (ETDEWEB)

    Hardin, Ernest [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-07-01

    This document presents design requirements and controlled assumptions intended for use in the engineering development and testing of: 1) prototype packages for radioactive waste disposal in deep boreholes; 2) a waste package surface handling system; and 3) a subsurface system for emplacing and retrieving packages in deep boreholes. Engineering development and testing is being performed as part of the Deep Borehole Field Test (DBFT; SNL 2014a). This document presents parallel sets of requirements for a waste disposal system and for the DBFT, showing the close relationship. In addition to design, it will also inform planning for drilling, construction, and scientific characterization activities for the DBFT. The information presented here follows typical preparations for engineering design. It includes functional and operating requirements for handling and emplacement/retrieval equipment, waste package design and emplacement requirements, borehole construction requirements, sealing requirements, and performance criteria. Assumptions are included where they could impact engineering design. Design solutions are avoided in the requirements discussion. Deep Borehole Field Test Requirements and Controlled Assumptions July 21, 2015 iv ACKNOWLEDGEMENTS This set of requirements and assumptions has benefited greatly from reviews by Gordon Appel, Geoff Freeze, Kris Kuhlman, Bob MacKinnon, Steve Pye, David Sassani, Dave Sevougian, and Jiann Su.

  3. Defining Game Mechanics

    DEFF Research Database (Denmark)

    Sicart (Vila), Miguel Angel

    2008-01-01

    This article defins game mechanics in relation to rules and challenges. Game mechanics are methods invoked by agents for interacting with the game world. I apply this definition to a comparative analysis of the games Rez, Every Extend Extra and Shadow of the Colossus that will show the relevance...... of a formal definition of game mechanics. Udgivelsesdato: Dec 2008...

  4. Modal Logics and Definability

    OpenAIRE

    Kuusisto, Antti

    2013-01-01

    In recent years, research into the mathematical foundations of modal logic has become increasingly popular. One of the main reasons for this is the fact that modal logic seems to adapt well to the requirements of a wide range of different fields of application. This paper is a summary of some of the author’s contributions to the understanding of modal definability theory.

  5. Software Defined Cyberinfrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Foster, Ian; Blaiszik, Ben; Chard, Kyle; Chard, Ryan

    2017-07-17

    Within and across thousands of science labs, researchers and students struggle to manage data produced in experiments, simulations, and analyses. Largely manual research data lifecycle management processes mean that much time is wasted, research results are often irreproducible, and data sharing and reuse remain rare. In response, we propose a new approach to data lifecycle management in which researchers are empowered to define the actions to be performed at individual storage systems when data are created or modified: actions such as analysis, transformation, copying, and publication. We term this approach software-defined cyberinfrastructure because users can implement powerful data management policies by deploying rules to local storage systems, much as software-defined networking allows users to configure networks by deploying rules to switches.We argue that this approach can enable a new class of responsive distributed storage infrastructure that will accelerate research innovation by allowing any researcher to associate data workflows with data sources, whether local or remote, for such purposes as data ingest, characterization, indexing, and sharing. We report on early experiments with this approach in the context of experimental science, in which a simple if-trigger-then-action (IFTA) notation is used to define rules.

  6. Defining Abnormally Low Tenders

    DEFF Research Database (Denmark)

    Ølykke, Grith Skovgaard; Nyström, Johan

    2017-01-01

    The concept of an abnormally low tender is not defined in EU public procurement law. This article takes an interdisciplinary law and economics approach to examine a dataset consisting of Swedish and Danish judgments and verdicts concerning the concept of an abnormally low tender. The purpose...

  7. Software Defined Coded Networking

    DEFF Research Database (Denmark)

    Di Paola, Carla; Roetter, Daniel Enrique Lucani; Palazzo, Sergio

    2017-01-01

    the quality of each link and even across neighbouring links and using simulations to show that an additional reduction of packet transmission in the order of 40% is possible. Second, to advocate for the use of network coding (NC) jointly with software defined networking (SDN) providing an implementation...

  8. Defining depth of anesthesia.

    Science.gov (United States)

    Shafer, S L; Stanski, D R

    2008-01-01

    In this chapter, drawn largely from the synthesis of material that we first presented in the sixth edition of Miller's Anesthesia, Chap 31 (Stanski and Shafer 2005; used by permission of the publisher), we have defined anesthetic depth as the probability of non-response to stimulation, calibrated against the strength of the stimulus, the difficulty of suppressing the response, and the drug-induced probability of non-responsiveness at defined effect site concentrations. This definition requires measurement of multiple different stimuli and responses at well-defined drug concentrations. There is no one stimulus and response measurement that will capture depth of anesthesia in a clinically or scientifically meaningful manner. The "clinical art" of anesthesia requires calibration of these observations of stimuli and responses (verbal responses, movement, tachycardia) against the dose and concentration of anesthetic drugs used to reduce the probability of response, constantly adjusting the administered dose to achieve the desired anesthetic depth. In our definition of "depth of anesthesia" we define the need for two components to create the anesthetic state: hypnosis created with drugs such as propofol or the inhalational anesthetics and analgesia created with the opioids or nitrous oxide. We demonstrate the scientific evidence that profound degrees of hypnosis in the absence of analgesia will not prevent the hemodynamic responses to profoundly noxious stimuli. Also, profound degrees of analgesia do not guarantee unconsciousness. However, the combination of hypnosis and analgesia suppresses hemodynamic response to noxious stimuli and guarantees unconsciousness.

  9. Defining and classifying syncope

    NARCIS (Netherlands)

    Thijs, Roland D.; Wieling, Wouter; Kaufmann, Horacio; van Dijk, Gert

    2004-01-01

    There is no widely adopted definition or classification of syncope and related disorders. This lack of uniformity harms patient care, research, and medical education. In this article, syncope is defined as a form of transient loss of consciousness (TLOC) due to cerebral hypoperfusion. Differences

  10. On a Search for Hidden Photon CDM by a Multicathode Counter

    International Nuclear Information System (INIS)

    Petukhov, V. V.; Kopylov, A. V.; Orekhov, I. V.

    2016-01-01

    We report a new technique of a multicathode counter (MCC) developed to search for hidden photon (HP) cold dark matter (CDM) with a mass from 5 to 500 eV. The method is suggested in the assumption that HP-photon mixing causes emission of single electrons from a metal cathode if the mass of hidden photon m_γ_"′ is greater than a work function of the metal φ_W. The measured effect from HP should be dependent on φ_W and on the structure of electronic shells of the metal used as a cathode. Potentially this can be used for a verification of the results obtained. Some preliminary results for the upper limit for mixing parameter χ have been obtained for HP with a mass from 5 eV to 10 keV as a pure illustration of the potential of this technique. The efforts are continued to refine the procedure of data treatment and to improve the work of MCC. A new detector with a more developed design is under construction.

  11. Sociocultural Dimension of Hidden Content in a Professional Language Curriculum

    Directory of Open Access Journals (Sweden)

    Ekaterina E. Shishlova

    2017-12-01

    Full Text Available Introduction: studying curriculum as a pedagogical problem has traditionally been reduced to the analysis of its explicit content, set in official educational documents. However, a much less studied hidden content plays a significant role in education. So, what is the role of the hidden curriculum during professional language training? The purpose of the article is to determine the potential impact of hidden curriculum on students’ conceptual worldview. Comparing the worldview presented in textbooks with students’ one has allowed us to estimate the rate of influence of hidden curr iculum. Materials and Methods: the methodological basis of the work is the cultural concept of personalityoriented education. The methodology for studying the role of hidden curriculum includes four stages: at the first stage, the authors set the criteria for selecting textbooks for analysis and do the selection; at the second stage, the authors select sociocultural concepts for analysis; at the third stage, the scheme of analysis is designed and the analysis of textbooks is done; at the fourth stage, the authors identify the potential influence of hidden curriculum on students’ conceptual worldview. Results: the structure of hidden curriculum has been determined and the scheme for analysing its subject component has been developed. The authors have identified a significant influence of hidden curriculum on students’ worldview, which represents the scientific novelty of the article. Discussion and Conclusions: the article gives the definition of a hidden curriculum which is new for Russian pedagogy and presents a methodology for its analysis in EFL textbooks. That analysis is recommended to be conducted when selecting teaching materials both i n languages and other humanities.

  12. Hidden Markov Item Response Theory Models for Responses and Response Times.

    Science.gov (United States)

    Molenaar, Dylan; Oberski, Daniel; Vermunt, Jeroen; De Boeck, Paul

    2016-01-01

    Current approaches to model responses and response times to psychometric tests solely focus on between-subject differences in speed and ability. Within subjects, speed and ability are assumed to be constants. Violations of this assumption are generally absorbed in the residual of the model. As a result, within-subject departures from the between-subject speed and ability level remain undetected. These departures may be of interest to the researcher as they reflect differences in the response processes adopted on the items of a test. In this article, we propose a dynamic approach for responses and response times based on hidden Markov modeling to account for within-subject differences in responses and response times. A simulation study is conducted to demonstrate acceptable parameter recovery and acceptable performance of various fit indices in distinguishing between different models. In addition, both a confirmatory and an exploratory application are presented to demonstrate the practical value of the modeling approach.

  13. Multilayer Neural Networks with Extensively Many Hidden Units

    International Nuclear Information System (INIS)

    Rosen-Zvi, Michal; Engel, Andreas; Kanter, Ido

    2001-01-01

    The information processing abilities of a multilayer neural network with a number of hidden units scaling as the input dimension are studied using statistical mechanics methods. The mapping from the input layer to the hidden units is performed by general symmetric Boolean functions, whereas the hidden layer is connected to the output by either discrete or continuous couplings. Introducing an overlap in the space of Boolean functions as order parameter, the storage capacity is found to scale with the logarithm of the number of implementable Boolean functions. The generalization behavior is smooth for continuous couplings and shows a discontinuous transition to perfect generalization for discrete ones

  14. Update on hidden sectors with dark forces and dark matter

    Energy Technology Data Exchange (ETDEWEB)

    Andreas, Sarah

    2012-11-15

    Recently there has been much interest in hidden sectors, especially in the context of dark matter and ''dark forces'', since they are a common feature of beyond standard model scenarios like string theory and SUSY and additionally exhibit interesting phenomenological aspects. Various laboratory experiments place limits on the so-called hidden photon and continuously further probe and constrain the parameter space; an updated overview is presented here. Furthermore, for several hidden sector models with light dark matter we study the viability with respect to the relic abundance and direct detection experiments.

  15. Hidden photon dark matter search with large metallic mirror

    International Nuclear Information System (INIS)

    Doebrich, Babette; Lindner, Axel; Daumiller, Kai; Engel, Ralph; Roth, Markus; Kowalski, Marek

    2014-10-01

    If Dark Matter is composed of hidden-sector photons that kinetically mix with photons of the visible sector, then Dark Matter has a tiny oscillating electric field component. Its presence would lead to a small amount of visible radiation being emitted from a conducting surface, with the photon frequency given approximately by the mass of the hidden photon. Here, we report on experimental efforts that have started recently to search for such hidden photon Dark Matter in the (sub-)eV regime with a prototype mirror for the Auger fluorescence detector at the Karlsruhe Institute for Technology.

  16. Naturally light hidden photons in LARGE volume string compactifications

    International Nuclear Information System (INIS)

    Goodsell, M.; Jaeckel, J.; Redondo, J.; Ringwald, A.

    2009-09-01

    Extra ''hidden'' U(1) gauge factors are a generic feature of string theory that is of particular phenomenological interest. They can kinetically mix with the Standard Model photon and are thereby accessible to a wide variety of astrophysical and cosmological observations and laboratory experiments. In this paper we investigate the masses and the kinetic mixing of hidden U(1)s in LARGE volume compactifications of string theory. We find that in these scenarios the hidden photons can be naturally light and that their kinetic mixing with the ordinary electromagnetic photon can be of a size interesting for near future experiments and observations. (orig.)

  17. Hidden Area and Mechanical Nonlinearities in Freestanding Graphene

    Science.gov (United States)

    Nicholl, Ryan J. T.; Lavrik, Nickolay V.; Vlassiouk, Ivan; Srijanto, Bernadeta R.; Bolotin, Kirill I.

    2017-06-01

    We investigated the effect of out-of-plane crumpling on the mechanical response of graphene membranes. In our experiments, stress was applied to graphene membranes using pressurized gas while the strain state was monitored through two complementary techniques: interferometric profilometry and Raman spectroscopy. By comparing the data obtained through these two techniques, we determined the geometric hidden area which quantifies the crumpling strength. While the devices with hidden area ˜0 % obeyed linear mechanics with biaxial stiffness 428 ±10 N /m , specimens with hidden area in the range 0.5%-1.0% were found to obey an anomalous nonlinear Hooke's law with an exponent ˜0.1 .

  18. Context Tree Estimation in Variable Length Hidden Markov Models

    OpenAIRE

    Dumont, Thierry

    2011-01-01

    We address the issue of context tree estimation in variable length hidden Markov models. We propose an estimator of the context tree of the hidden Markov process which needs no prior upper bound on the depth of the context tree. We prove that the estimator is strongly consistent. This uses information-theoretic mixture inequalities in the spirit of Finesso and Lorenzo(Consistent estimation of the order for Markov and hidden Markov chains(1990)) and E.Gassiat and S.Boucheron (Optimal error exp...

  19. Local models and hidden nonlocality in Quantum Theory

    OpenAIRE

    Guerini, Leonardo

    2014-01-01

    This Master's thesis has two central subjects: the simulation of correlations generated by local measurements on entangled quantum states by local hidden-variables models and the revelation of hidden nonlocality. We present and detail the Werner's local model and the hidden nonlocality of some Werner states of dimension $d\\geq5$, the Gisin-Degorre's local model for a Werner state of dimension $d=2$ and the local model of Hirsch et al. for mixtures of the singlet state and noise, all of them f...

  20. Suppressing the QCD axion abundance by hidden monopoles

    International Nuclear Information System (INIS)

    Kawasaki, Masahiro

    2015-11-01

    We study the Witten effect of hidden monopoles on the QCD axion dynamics, and show that its abundance as well as isocurvature perturbations can be significantly suppressed if there is a sufficient amount of hidden monopoles. When the hidden monopoles make up a significant fraction of dark matter, the Witten effect suppresses the abundance of axion with the decay constant smaller than 10 12 GeV. The cosmological domain wall problem of the QCD axion can also be avoided, relaxing the upper bound on the decay constant when the Peccei-Quinn symmetry is spontaneously broken after inflation.

  1. A Synthetic Indicator of a Company's Level of Intellectual Capital as a Hidden Value

    Directory of Open Access Journals (Sweden)

    Przemysław Dominiak

    2016-01-01

    Full Text Available The authors of the paper analyzed 21 common methods of measuring a company's intellectual capital, finding that none of them meet all 6 demands that a model indicator should satisfy. As a result, a new method was developed, which meets the conditions for a model indicator. Using the chosen expert method, a synthetic indicator of a company's level of intellectual capital (WPKI has been determined. The authors of the paper determine the WPKI indicator for public construction companies using the algorithm defining a hidden value. (original abstract

  2. Hidden SUSY from precision gauge unification

    Energy Technology Data Exchange (ETDEWEB)

    Krippendorf, Sven; Nilles, Hans Peter [Bonn Univ. (Germany). Bethe Center for Theoretical Physics; Bonn Univ. (Germany). Physikalisches Inst.; Ratz, Michael [Technische Univ. Muenchen, Garching (Germany). Physik-Department; Winkler, Martin Wolfgang [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2013-06-15

    We revisit the implications of naturalness and gauge unification in the MSSM. We find that precision unification of the couplings in connection with a small {mu} parameter requires a highly compressed gaugino pattern as it is realized in mirage mediation. Due to the small mass difference between gluino and LSP, collider limits on the gluino mass are drastically relaxed. Without further assumptions, the relic density of the LSP is very close to the observed dark matter density due to coannihilation effects.

  3. Hidden SUSY from precision gauge unification

    International Nuclear Information System (INIS)

    Krippendorf, Sven; Nilles, Hans Peter

    2013-06-01

    We revisit the implications of naturalness and gauge unification in the MSSM. We find that precision unification of the couplings in connection with a small μ parameter requires a highly compressed gaugino pattern as it is realized in mirage mediation. Due to the small mass difference between gluino and LSP, collider limits on the gluino mass are drastically relaxed. Without further assumptions, the relic density of the LSP is very close to the observed dark matter density due to coannihilation effects.

  4. On the Empirical Importance of the Conditional Skewness Assumption in Modelling the Relationship between Risk and Return

    Science.gov (United States)

    Pipień, M.

    2008-09-01

    We present the results of an application of Bayesian inference in testing the relation between risk and return on the financial instruments. On the basis of the Intertemporal Capital Asset Pricing Model, proposed by Merton we built a general sampling distribution suitable in analysing this relationship. The most important feature of our assumptions is that the skewness of the conditional distribution of returns is used as an alternative source of relation between risk and return. This general specification relates to Skewed Generalized Autoregressive Conditionally Heteroscedastic-in-Mean model. In order to make conditional distribution of financial returns skewed we considered the unified approach based on the inverse probability integral transformation. In particular, we applied hidden truncation mechanism, inverse scale factors, order statistics concept, Beta and Bernstein distribution transformations and also a constructive method. Based on the daily excess returns on the Warsaw Stock Exchange Index we checked the empirical importance of the conditional skewness assumption on the relation between risk and return on the Warsaw Stock Market. We present posterior probabilities of all competing specifications as well as the posterior analysis of the positive sign of the tested relationship.

  5. Defining Legal Moralism

    DEFF Research Database (Denmark)

    Thaysen, Jens Damgaard

    2015-01-01

    This paper discusses how legal moralism should be defined. It is argued that legal moralism should be defined as the position that “For any X, it is always a pro tanto reason for justifiably imposing legal regulation on X that X is morally wrong (where “morally wrong” is not conceptually equivalent...... to “harmful”)”. Furthermore, a distinction between six types of legal moralism is made. The six types are grouped according to whether they are concerned with the enforcement of positive or critical morality, and whether they are concerned with criminalising, legally restricting, or refraining from legally...... protecting morally wrong behaviour. This is interesting because not all types of legal moralism are equally vulnerable to the different critiques of legal moralism that have been put forth. Indeed, I show that some interesting types of legal moralism have not been criticised at all....

  6. Defining local food

    DEFF Research Database (Denmark)

    Eriksen, Safania Normann

    2013-01-01

    Despite evolving local food research, there is no consistent definition of “local food.” Various understandings are utilized, which have resulted in a diverse landscape of meaning. The main purpose of this paper is to examine how researchers within the local food systems literature define local...... food, and how these definitions can be used as a starting point to identify a new taxonomy of local food based on three domains of proximity....

  7. High Energy Colliders and Hidden Sectors

    Science.gov (United States)

    Dror, Asaf Jeff

    This thesis explores two dominant frontiers of theoretical physics, high energy colliders and hidden sectors. The Large Hadron Collider (LHC) is just starting to reach its maximum operational capabilities. However, already with the current data, large classes of models are being put under significant pressure. It is crucial to understand whether the (thus far) null results are a consequence of a lack of solution to the hierarchy problem around the weak scale or requires expanding the search strategy employed at the LHC. It is the duty of the current generation of physicists to design new searches to ensure that no stone is left unturned. To this end, we study the sensitivity of the LHC to the couplings in the Standard Model top sector. We find it can significantly improve the measurements on ZtRtR coupling by a novel search strategy, making use of an implied unitarity violation in such models. Analogously, we show that other couplings in the top sector can also be measured with the same technique. Furthermore, we critically analyze a set of anomalies in the LHC data and how they may appear from consistent UV completions. We also propose a technique to measure lifetimes of new colored particles with non-trivial spin. While the high energy frontier will continue to take data, it is likely the only collider of its kind for the next couple decades. On the other hand, low-energy experiments have a promising future with many new proposed experiments to probe the existence of particles well below the weak scale but with small couplings to the Standard Model. In this work we survey the different possibilities, focusingon the constraints as well as possible new hidden sector dynamics. In particular, we show that vector portals which couple to an anomalous current, e.g., baryon number, are significantly constrained from flavor changing meson decays and rare Z decays. Furthermore, we present a new mechanism for dark matter freezeout which depletes the dark sector through an

  8. Alleviating hidden hunger. Approaches that work

    International Nuclear Information System (INIS)

    Kennedy, E.; Mannar, V.; Iyengar, V.

    2003-01-01

    The world has come a long way in understanding the nature, magnitude and range of solutions to micronutrient malnutrition - often called 'hidden hunger'. The most sustainable solutions - that is those that are likely to be maintained in the long term - almost surely will include food-based approaches including diet diversity, food fortification and biofortification. Food fortification and biofortification could be some of the most cost-effective of all public health interventions and thus within the economic reach of even the world's poorest. In order to implement them in a sustainable manner, a combination of technical, operational, economic, behavioural and political factors need to be addressed. In some ways the technological issues are the easiest. Because of attention to research, we now have a variety of ways for both single and multiple micronutrients to reach the target population. We also know what is needed in order to ensure delivery systems. The key factor for continued success in reducing micronutrient malnutrition through fortification is a political commitment at the national and international level and creating effective public-private partnerships at the national level. The payoff for eliminating hidden hunger through nutrient fortification is enormous and few other public health interventions offer such a promising health, nutrition and economic success story. Nuclear and isotopic techniques are valuable tools in helping to meet the multifaceted challenges posed by nutritional disorders affecting the entire human life span (embryonic to elderly). Among the numerous applications available, isotopic techniques are uniquely well suited for targeting and tracking progress in food and nutrition development programmes (See box: How Nutrients are Tracked). These include: use of the stable isotopes of iron (Fe) and zinc (Zn) as a kind of gold standard in studies of their bioavailability from foods; trace element bioavailability and pool sizes for

  9. On the ontological assumptions of the medical model of psychiatry: philosophical considerations and pragmatic tasks

    Directory of Open Access Journals (Sweden)

    Giordano James

    2010-01-01

    Full Text Available Abstract A common theme in the contemporary medical model of psychiatry is that pathophysiological processes are centrally involved in the explanation, evaluation, and treatment of mental illnesses. Implied in this perspective is that clinical descriptors of these pathophysiological processes are sufficient to distinguish underlying etiologies. Psychiatric classification requires differentiation between what counts as normality (i.e.- order, and what counts as abnormality (i.e.- disorder. The distinction(s between normality and pathology entail assumptions that are often deeply presupposed, manifesting themselves in statements about what mental disorders are. In this paper, we explicate that realism, naturalism, reductionism, and essentialism are core ontological assumptions of the medical model of psychiatry. We argue that while naturalism, realism, and reductionism can be reconciled with advances in contemporary neuroscience, essentialism - as defined to date - may be conceptually problematic, and we pose an eidetic construct of bio-psychosocial order and disorder based upon complex systems' dynamics. However we also caution against the overuse of any theory, and claim that practical distinctions are important to the establishment of clinical thresholds. We opine that as we move ahead toward both a new edition of the Diagnostic and Statistical Manual, and a proposed Decade of the Mind, the task at hand is to re-visit nosologic and ontologic assumptions pursuant to a re-formulation of diagnostic criteria and practice.

  10. On the ontological assumptions of the medical model of psychiatry: philosophical considerations and pragmatic tasks

    Science.gov (United States)

    2010-01-01

    A common theme in the contemporary medical model of psychiatry is that pathophysiological processes are centrally involved in the explanation, evaluation, and treatment of mental illnesses. Implied in this perspective is that clinical descriptors of these pathophysiological processes are sufficient to distinguish underlying etiologies. Psychiatric classification requires differentiation between what counts as normality (i.e.- order), and what counts as abnormality (i.e.- disorder). The distinction(s) between normality and pathology entail assumptions that are often deeply presupposed, manifesting themselves in statements about what mental disorders are. In this paper, we explicate that realism, naturalism, reductionism, and essentialism are core ontological assumptions of the medical model of psychiatry. We argue that while naturalism, realism, and reductionism can be reconciled with advances in contemporary neuroscience, essentialism - as defined to date - may be conceptually problematic, and we pose an eidetic construct of bio-psychosocial order and disorder based upon complex systems' dynamics. However we also caution against the overuse of any theory, and claim that practical distinctions are important to the establishment of clinical thresholds. We opine that as we move ahead toward both a new edition of the Diagnostic and Statistical Manual, and a proposed Decade of the Mind, the task at hand is to re-visit nosologic and ontologic assumptions pursuant to a re-formulation of diagnostic criteria and practice. PMID:20109176

  11. Prediction of Annual Rainfall Pattern Using Hidden Markov Model ...

    African Journals Online (AJOL)

    ADOWIE PERE

    Hidden Markov model is very influential in stochastic world because of its ... the earth from the clouds. The usual ... Rainfall modelling and ... Markov Models have become popular tools ... environment sciences, University of Jos, plateau state,.

  12. New limits on hidden photons from past electron beam dumps

    International Nuclear Information System (INIS)

    Andreas, Sarah; Niebuhr, Carsten; Ringwald, Andreas

    2012-09-01

    Hidden sectors with light extra U(1) gauge bosons, so called hidden photons, have recently attracted some attention because they are a common feature of physics beyond the Standard Model like string theory and SUSY and additionally are phenomenologically of great interest regarding recent astrophysical observations. The hidden photon is already constrained by various laboratory experiments and presently searched for in running as well as upcoming experiments. We summarize the current status of limits on hidden photons from past electron beam dump experiments including two new limits from such experiments at KEK and Orsay that have so far not been considered. All our limits take into account the experimental acceptances obtained from Monte Carlo simulations.

  13. Search for hidden particles with the SHiP experiment

    Energy Technology Data Exchange (ETDEWEB)

    Hagner, Caren; Bick, Daniel; Bieschke, Stefan; Ebert, Joachim; Schmidt-Parzefall, Walter [Universitaet Hamburg, Institut fuer Experimentalphysik, Luruper Chaussee 149, 22761 Hamburg (Germany)

    2016-07-01

    Many theories beyond the standard model predict long lived neutral (hidden) particles. There might be a whole Hidden Sector (HS) of weakly interacting particles, which cannot be detected in existing high energy experiments. The SHiP experiment (Search for Hidden Particles) requires a high intensity beam dump, which could be realized by a new facility at the CERN SPS accelerator. New superweakly interacting particles with masses below O(10) GeV could be produced in the beam dump and detected in a general purpose Hidden Sector (HS) detector. In addition there will be a dedicated tau neutrino subdetector. I present the major requirements and technical challenges for the HS detector and discuss how the HS can be accessed through several portals: neutrino portal, scalar portal, vector portal and many more.

  14. Cosmological abundance of the QCD axion coupled to hidden photons

    Science.gov (United States)

    Kitajima, Naoya; Sekiguchi, Toyokazu; Takahashi, Fuminobu

    2018-06-01

    We study the cosmological evolution of the QCD axion coupled to hidden photons. For a moderately strong coupling, the motion of the axion field leads to an explosive production of hidden photons by tachyonic instability. We use lattice simulations to evaluate the cosmological abundance of the QCD axion. In doing so, we incorporate the backreaction of the produced hidden photons on the axion dynamics, which becomes significant in the non-linear regime. We find that the axion abundance is suppressed by at most O (102) for the decay constant fa =1016GeV, compared to the case without the coupling. For a sufficiently large coupling, the motion of the QCD axion becomes strongly damped, and as a result, the axion abundance is enhanced. Our results show that the cosmological upper bound on the axion decay constant can be relaxed by a few hundred for a certain range of the coupling to hidden photons.

  15. Dopamine reward prediction errors reflect hidden state inference across time

    Science.gov (United States)

    Starkweather, Clara Kwon; Babayan, Benedicte M.; Uchida, Naoshige; Gershman, Samuel J.

    2017-01-01

    Midbrain dopamine neurons signal reward prediction error (RPE), or actual minus expected reward. The temporal difference (TD) learning model has been a cornerstone in understanding how dopamine RPEs could drive associative learning. Classically, TD learning imparts value to features that serially track elapsed time relative to observable stimuli. In the real world, however, sensory stimuli provide ambiguous information about the hidden state of the environment, leading to the proposal that TD learning might instead compute a value signal based on an inferred distribution of hidden states (a ‘belief state’). In this work, we asked whether dopaminergic signaling supports a TD learning framework that operates over hidden states. We found that dopamine signaling exhibited a striking difference between two tasks that differed only with respect to whether reward was delivered deterministically. Our results favor an associative learning rule that combines cached values with hidden state inference. PMID:28263301

  16. Optimisation of Hidden Markov Model using Baum–Welch algorithm ...

    Indian Academy of Sciences (India)

    The present work is a part of development of Hidden Markov Model. (HMM) based ... the Himalaya. In this work, HMMs have been developed for forecasting of maximum and minimum ..... data collection teams of Snow and Avalanche Study.

  17. Risk from the frontlines of a hidden epidemic sexuality, masculinities ...

    African Journals Online (AJOL)

    Risk from the frontlines of a hidden epidemic sexuality, masculinities and social pressures ... It frames risk in the context of the dynamics governing sexuality, underlined ... MSM risk and practice, in these contexts, are consequently shaped by ...

  18. New limits on hidden photons from past electron beam dumps

    Energy Technology Data Exchange (ETDEWEB)

    Andreas, Sarah; Niebuhr, Carsten; Ringwald, Andreas

    2012-09-15

    Hidden sectors with light extra U(1) gauge bosons, so called hidden photons, have recently attracted some attention because they are a common feature of physics beyond the Standard Model like string theory and SUSY and additionally are phenomenologically of great interest regarding recent astrophysical observations. The hidden photon is already constrained by various laboratory experiments and presently searched for in running as well as upcoming experiments. We summarize the current status of limits on hidden photons from past electron beam dump experiments including two new limits from such experiments at KEK and Orsay that have so far not been considered. All our limits take into account the experimental acceptances obtained from Monte Carlo simulations.

  19. Models for waste life cycle assessment: Review of technical assumptions

    DEFF Research Database (Denmark)

    Gentil, Emmanuel; Damgaard, Anders; Hauschild, Michael Zwicky

    2010-01-01

    A number of waste life cycle assessment (LCA) models have been gradually developed since the early 1990s, in a number of countries, usually independently from each other. Large discrepancies in results have been observed among different waste LCA models, although it has also been shown that results...... from different LCA studies can be consistent. This paper is an attempt to identify, review and analyse methodologies and technical assumptions used in various parts of selected waste LCA models. Several criteria were identified, which could have significant impacts on the results......, such as the functional unit, system boundaries, waste composition and energy modelling. The modelling assumptions of waste management processes, ranging from collection, transportation, intermediate facilities, recycling, thermal treatment, biological treatment, and landfilling, are obviously critical when comparing...

  20. Validity of the mockwitness paradigm: testing the assumptions.

    Science.gov (United States)

    McQuiston, Dawn E; Malpass, Roy S

    2002-08-01

    Mockwitness identifications are used to provide a quantitative measure of lineup fairness. Some theoretical and practical assumptions of this paradigm have not been studied in terms of mockwitnesses' decision processes and procedural variation (e.g., instructions, lineup presentation method), and the current experiment was conducted to empirically evaluate these assumptions. Four hundred and eighty mockwitnesses were given physical information about a culprit, received 1 of 4 variations of lineup instructions, and were asked to identify the culprit from either a fair or unfair sequential lineup containing 1 of 2 targets. Lineup bias estimates varied as a result of lineup fairness and the target presented. Mockwitnesses generally reported that the target's physical description was their main source of identifying information. Our findings support the use of mockwitness identifications as a useful technique for sequential lineup evaluation, but only for mockwitnesses who selected only 1 lineup member. Recommendations for the use of this evaluation procedure are discussed.

  1. Determining Bounds on Assumption Errors in Operational Analysis

    Directory of Open Access Journals (Sweden)

    Neal M. Bengtson

    2014-01-01

    Full Text Available The technique of operational analysis (OA is used in the study of systems performance, mainly for estimating mean values of various measures of interest, such as, number of jobs at a device and response times. The basic principles of operational analysis allow errors in assumptions to be quantified over a time period. The assumptions which are used to derive the operational analysis relationships are studied. Using Karush-Kuhn-Tucker (KKT conditions bounds on error measures of these OA relationships are found. Examples of these bounds are used for representative performance measures to show limits on the difference between true performance values and those estimated by operational analysis relationships. A technique for finding tolerance limits on the bounds is demonstrated with a simulation example.

  2. The sufficiency assumption of the reasoned approach to action

    Directory of Open Access Journals (Sweden)

    David Trafimow

    2015-12-01

    Full Text Available The reasoned action approach to understanding and predicting behavior includes the sufficiency assumption. Although variables not included in the theory may influence behavior, these variables work through the variables in the theory. Once the reasoned action variables are included in an analysis, the inclusion of other variables will not increase the variance accounted for in behavioral intentions or behavior. Reasoned action researchers are very concerned with testing if new variables account for variance (or how much traditional variables account for variance, to see whether they are important, in general or with respect to specific behaviors under investigation. But this approach tacitly assumes that accounting for variance is highly relevant to understanding the production of variance, which is what really is at issue. Based on the variance law, I question this assumption.

  3. Forecasting Value-at-Risk under Different Distributional Assumptions

    Directory of Open Access Journals (Sweden)

    Manuela Braione

    2016-01-01

    Full Text Available Financial asset returns are known to be conditionally heteroskedastic and generally non-normally distributed, fat-tailed and often skewed. These features must be taken into account to produce accurate forecasts of Value-at-Risk (VaR. We provide a comprehensive look at the problem by considering the impact that different distributional assumptions have on the accuracy of both univariate and multivariate GARCH models in out-of-sample VaR prediction. The set of analyzed distributions comprises the normal, Student, Multivariate Exponential Power and their corresponding skewed counterparts. The accuracy of the VaR forecasts is assessed by implementing standard statistical backtesting procedures used to rank the different specifications. The results show the importance of allowing for heavy-tails and skewness in the distributional assumption with the skew-Student outperforming the others across all tests and confidence levels.

  4. A Novel Method for Decoding Any High-Order Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Fei Ye

    2014-01-01

    Full Text Available This paper proposes a novel method for decoding any high-order hidden Markov model. First, the high-order hidden Markov model is transformed into an equivalent first-order hidden Markov model by Hadar’s transformation. Next, the optimal state sequence of the equivalent first-order hidden Markov model is recognized by the existing Viterbi algorithm of the first-order hidden Markov model. Finally, the optimal state sequence of the high-order hidden Markov model is inferred from the optimal state sequence of the equivalent first-order hidden Markov model. This method provides a unified algorithm framework for decoding hidden Markov models including the first-order hidden Markov model and any high-order hidden Markov model.

  5. Sensitivity of probabilistic MCO water content estimates to key assumptions

    International Nuclear Information System (INIS)

    DUNCAN, D.R.

    1999-01-01

    Sensitivity of probabilistic multi-canister overpack (MCO) water content estimates to key assumptions is evaluated with emphasis on the largest non-cladding film-contributors, water borne by particulates adhering to damage sites, and water borne by canister particulate. Calculations considered different choices of damage state degree of independence, different choices of percentile for reference high inputs, three types of input probability density function (pdfs): triangular, log-normal, and Weibull, and the number of scrap baskets in an MCO

  6. Spatial Angular Compounding for Elastography without the Incompressibility Assumption

    OpenAIRE

    Rao, Min; Varghese, Tomy

    2005-01-01

    Spatial-angular compounding is a new technique that enables the reduction of noise artifacts in ultrasound elastography. Previous results using spatial angular compounding, however, were based on the use of the tissue incompressibility assumption. Compounded elastograms were obtained from a spatially-weighted average of local strain estimated from radiofrequency echo signals acquired at different insonification angles. In this paper, we present a new method for reducing the noise artifacts in...

  7. Estimators for longitudinal latent exposure models: examining measurement model assumptions.

    Science.gov (United States)

    Sánchez, Brisa N; Kim, Sehee; Sammel, Mary D

    2017-06-15

    Latent variable (LV) models are increasingly being used in environmental epidemiology as a way to summarize multiple environmental exposures and thus minimize statistical concerns that arise in multiple regression. LV models may be especially useful when multivariate exposures are collected repeatedly over time. LV models can accommodate a variety of assumptions but, at the same time, present the user with many choices for model specification particularly in the case of exposure data collected repeatedly over time. For instance, the user could assume conditional independence of observed exposure biomarkers given the latent exposure and, in the case of longitudinal latent exposure variables, time invariance of the measurement model. Choosing which assumptions to relax is not always straightforward. We were motivated by a study of prenatal lead exposure and mental development, where assumptions of the measurement model for the time-changing longitudinal exposure have appreciable impact on (maximum-likelihood) inferences about the health effects of lead exposure. Although we were not particularly interested in characterizing the change of the LV itself, imposing a longitudinal LV structure on the repeated multivariate exposure measures could result in high efficiency gains for the exposure-disease association. We examine the biases of maximum likelihood estimators when assumptions about the measurement model for the longitudinal latent exposure variable are violated. We adapt existing instrumental variable estimators to the case of longitudinal exposures and propose them as an alternative to estimate the health effects of a time-changing latent predictor. We show that instrumental variable estimators remain unbiased for a wide range of data generating models and have advantages in terms of mean squared error. Copyright © 2017 John Wiley & Sons, Ltd. Copyright © 2017 John Wiley & Sons, Ltd.

  8. Data-driven smooth tests of the proportional hazards assumption

    Czech Academy of Sciences Publication Activity Database

    Kraus, David

    2007-01-01

    Roč. 13, č. 1 (2007), s. 1-16 ISSN 1380-7870 R&D Projects: GA AV ČR(CZ) IAA101120604; GA ČR(CZ) GD201/05/H007 Institutional research plan: CEZ:AV0Z10750506 Keywords : Cox model * Neyman's smooth test * proportional hazards assumption * Schwarz's selection rule Subject RIV: BA - General Mathematics Impact factor: 0.491, year: 2007

  9. Assumptions behind size-based ecosystem models are realistic

    DEFF Research Database (Denmark)

    Andersen, Ken Haste; Blanchard, Julia L.; Fulton, Elizabeth A.

    2016-01-01

    A recent publication about balanced harvesting (Froese et al., ICES Journal of Marine Science; doi:10.1093/icesjms/fsv122) contains several erroneous statements about size-spectrum models. We refute the statements by showing that the assumptions pertaining to size-spectrum models discussed by Fro...... that there is indeed a constructive role for a wide suite of ecosystem models to evaluate fishing strategies in an ecosystem context...

  10. Bank stress testing under different balance sheet assumptions

    OpenAIRE

    Busch, Ramona; Drescher, Christian; Memmel, Christoph

    2017-01-01

    Using unique supervisory survey data on the impact of a hypothetical interest rate shock on German banks, we analyse price and quantity effects on banks' net interest margin components under different balance sheet assumptions. In the first year, the cross-sectional variation of banks' simulated price effect is nearly eight times as large as the one of the simulated quantity effect. After five years, however, the importance of both effects converges. Large banks adjust their balance sheets mo...

  11. Hidden Markov event sequence models: toward unsupervised functional MRI brain mapping.

    Science.gov (United States)

    Faisan, Sylvain; Thoraval, Laurent; Armspach, Jean-Paul; Foucher, Jack R; Metz-Lutz, Marie-Noëlle; Heitz, Fabrice

    2005-01-01

    Most methods used in functional MRI (fMRI) brain mapping require restrictive assumptions about the shape and timing of the fMRI signal in activated voxels. Consequently, fMRI data may be partially and misleadingly characterized, leading to suboptimal or invalid inference. To limit these assumptions and to capture the broad range of possible activation patterns, a novel statistical fMRI brain mapping method is proposed. It relies on hidden semi-Markov event sequence models (HSMESMs), a special class of hidden Markov models (HMMs) dedicated to the modeling and analysis of event-based random processes. Activation detection is formulated in terms of time coupling between (1) the observed sequence of hemodynamic response onset (HRO) events detected in the voxel's fMRI signal and (2) the "hidden" sequence of task-induced neural activation onset (NAO) events underlying the HROs. Both event sequences are modeled within a single HSMESM. The resulting brain activation model is trained to automatically detect neural activity embedded in the input fMRI data set under analysis. The data sets considered in this article are threefold: synthetic epoch-related, real epoch-related (auditory lexical processing task), and real event-related (oddball detection task) fMRI data sets. Synthetic data: Activation detection results demonstrate the superiority of the HSMESM mapping method with respect to a standard implementation of the statistical parametric mapping (SPM) approach. They are also very close, sometimes equivalent, to those obtained with an "ideal" implementation of SPM in which the activation patterns synthesized are reused for analysis. The HSMESM method appears clearly insensitive to timing variations of the hemodynamic response and exhibits low sensitivity to fluctuations of its shape (unsustained activation during task). Real epoch-related data: HSMESM activation detection results compete with those obtained with SPM, without requiring any prior definition of the expected

  12. A two particle hidden sector and the oscillations with photons

    Energy Technology Data Exchange (ETDEWEB)

    Alvarez, Pedro D. [Universidad de Antofagasta, Departamento de Fisica, Antofagasta (Chile); Arias, Paola; Maldonado, Carlos [Universidad de Santiago de Chile, Departmento de Fisica, Santiago (Chile)

    2018-01-15

    We present a detailed study of the oscillations and optical properties for vacuum, in a model for the dark sector that contains axion-like particles and hidden photons. We provide bounds for the couplings versus the mass, using current results from ALPS-I and PVLAS. We also discuss the challenges for the detection of models with more than one hidden particle in light shining trough wall-like experiments. (orig.)

  13. Rare Z boson decays to a hidden sector

    Science.gov (United States)

    Blinov, Nikita; Izaguirre, Eder; Shuve, Brian

    2018-01-01

    We demonstrate that rare decays of the Standard Model Z boson can be used to discover and characterize the nature of new hidden-sector particles. We propose new searches for these particles in soft, high-multiplicity leptonic final states at the Large Hadron Collider. The proposed searches are sensitive to low-mass particles produced in Z decays, and we argue that these striking signatures can shed light on the hidden-sector couplings and mechanism for mass generation.

  14. Anticipating hidden text salting in emails (extended abstract)

    OpenAIRE

    Lioma, Christina; Moens, Marie-Francine; Gomez, Juan Carlos; De Beer, Jan; Bergholz, Andre; Paass, Gerhard; Horkan, Patrick

    2008-01-01

    Salting is the intentional addition or distortion of content, aimed to evade automatic filtering. Salting is usually found in spam emails. Salting can also be hidden in phishing emails, which aim to steal personal information from users. We present a novel method that detects hidden salting tricks as visual anomalies in text. We solely use these salting tricks to successfully classify emails as phishing (F-measure >90%).

  15. Hidden charged dark matter and chiral dark radiation

    Science.gov (United States)

    Ko, P.; Nagata, Natsumi; Tang, Yong

    2017-10-01

    In the light of recent possible tensions in the Hubble constant H0 and the structure growth rate σ8 between the Planck and other measurements, we investigate a hidden-charged dark matter (DM) model where DM interacts with hidden chiral fermions, which are charged under the hidden SU(N) and U(1) gauge interactions. The symmetries in this model assure these fermions to be massless. The DM in this model, which is a Dirac fermion and singlet under the hidden SU(N), is also assumed to be charged under the U(1) gauge symmetry, through which it can interact with the chiral fermions. Below the confinement scale of SU(N), the hidden quark condensate spontaneously breaks the U(1) gauge symmetry such that there remains a discrete symmetry, which accounts for the stability of DM. This condensate also breaks a flavor symmetry in this model and Nambu-Goldstone bosons associated with this flavor symmetry appear below the confinement scale. The hidden U(1) gauge boson and hidden quarks/Nambu-Goldstone bosons are components of dark radiation (DR) above/below the confinement scale. These light fields increase the effective number of neutrinos by δNeff ≃ 0.59 above the confinement scale for N = 2, resolving the tension in the measurements of the Hubble constant by Planck and Hubble Space Telescope if the confinement scale is ≲1 eV. DM and DR continuously scatter with each other via the hidden U(1) gauge interaction, which suppresses the matter power spectrum and results in a smaller structure growth rate. The DM sector couples to the Standard Model sector through the exchange of a real singlet scalar mixing with the Higgs boson, which makes it possible to probe our model in DM direct detection experiments. Variants of this model are also discussed, which may offer alternative ways to investigate this scenario.

  16. The incompressibility assumption in computational simulations of nasal airflow.

    Science.gov (United States)

    Cal, Ismael R; Cercos-Pita, Jose Luis; Duque, Daniel

    2017-06-01

    Most of the computational works on nasal airflow up to date have assumed incompressibility, given the low Mach number of these flows. However, for high temperature gradients, the incompressibility assumption could lead to a loss of accuracy, due to the temperature dependence of air density and viscosity. In this article we aim to shed some light on the influence of this assumption in a model of calm breathing in an Asian nasal cavity, by solving the fluid flow equations in compressible and incompressible formulation for different ambient air temperatures using the OpenFOAM package. At low flow rates and warm climatological conditions, similar results were obtained from both approaches, showing that density variations need not be taken into account to obtain a good prediction of all flow features, at least for usual breathing conditions. This agrees with most of the simulations previously reported, at least as far as the incompressibility assumption is concerned. However, parameters like nasal resistance and wall shear stress distribution differ for air temperatures below [Formula: see text]C approximately. Therefore, density variations should be considered for simulations at such low temperatures.

  17. Search algorithms, hidden labour and information control

    Directory of Open Access Journals (Sweden)

    Paško Bilić

    2016-06-01

    Full Text Available The paper examines some of the processes of the closely knit relationship between Google’s ideologies of neutrality and objectivity and global market dominance. Neutrality construction comprises an important element sustaining the company’s economic position and is reflected in constant updates, estimates and changes to utility and relevance of search results. Providing a purely technical solution to these issues proves to be increasingly difficult without a human hand in steering algorithmic solutions. Search relevance fluctuates and shifts through continuous tinkering and tweaking of the search algorithm. The company also uses third parties to hire human raters for performing quality assessments of algorithmic updates and adaptations in linguistically and culturally diverse global markets. The adaptation process contradicts the technical foundations of the company and calculations based on the initial Page Rank algorithm. Annual market reports, Google’s Search Quality Rating Guidelines, and reports from media specialising in search engine optimisation business are analysed. The Search Quality Rating Guidelines document provides a rare glimpse into the internal architecture of search algorithms and the notions of utility and relevance which are presented and structured as neutral and objective. Intertwined layers of ideology, hidden labour of human raters, advertising revenues, market dominance and control are discussed throughout the paper.

  18. Hidden Structural Codes in Protein Intrinsic Disorder.

    Science.gov (United States)

    Borkosky, Silvia S; Camporeale, Gabriela; Chemes, Lucía B; Risso, Marikena; Noval, María Gabriela; Sánchez, Ignacio E; Alonso, Leonardo G; de Prat Gay, Gonzalo

    2017-10-17

    Intrinsic disorder is a major structural category in biology, accounting for more than 30% of coding regions across the domains of life, yet consists of conformational ensembles in equilibrium, a major challenge in protein chemistry. Anciently evolved papillomavirus genomes constitute an unparalleled case for sequence to structure-function correlation in cases in which there are no folded structures. E7, the major transforming oncoprotein of human papillomaviruses, is a paradigmatic example among the intrinsically disordered proteins. Analysis of a large number of sequences of the same viral protein allowed for the identification of a handful of residues with absolute conservation, scattered along the sequence of its N-terminal intrinsically disordered domain, which intriguingly are mostly leucine residues. Mutation of these led to a pronounced increase in both α-helix and β-sheet structural content, reflected by drastic effects on equilibrium propensities and oligomerization kinetics, and uncovers the existence of local structural elements that oppose canonical folding. These folding relays suggest the existence of yet undefined hidden structural codes behind intrinsic disorder in this model protein. Thus, evolution pinpoints conformational hot spots that could have not been identified by direct experimental methods for analyzing or perturbing the equilibrium of an intrinsically disordered protein ensemble.

  19. Dietary phytate, zinc and hidden zinc deficiency.

    Science.gov (United States)

    Sandstead, Harold H; Freeland-Graves, Jeanne H

    2014-10-01

    Epidemiological data suggest at least one in five humans are at risk of zinc deficiency. This is in large part because the phytate in cereals and legumes has not been removed during food preparation. Phytate, a potent indigestible ligand for zinc prevents it's absorption. Without knowledge of the frequency of consumption of foods rich in phytate, and foods rich in bioavailable zinc, the recognition of zinc deficiency early in the illness may be difficult. Plasma zinc is insensitive to early zinc deficiency. Serum ferritin concentration≤20μg/L is a potential indirect biomarker. Early effects of zinc deficiency are chemical, functional and may be "hidden". The clinical problem is illustrated by 2 studies that involved US Mexican-American children, and US premenopausal women. The children were consuming home diets that included traditional foods high in phytate. The premenopausal women were not eating red meat on a regular basis, and their consumption of phytate was mainly from bran breakfast cereals. In both studies the presence of zinc deficiency was proven by functional responses to controlled zinc treatment. In the children lean-mass, reasoning, and immunity were significantly affected. In the women memory, reasoning, and eye-hand coordination were significantly affected. A screening self-administered food frequency questionnaire for office might help caregiver's identify patients at risk of zinc deficiency. Copyright © 2014 Elsevier GmbH. All rights reserved.

  20. Natural inflation with hidden scale invariance

    Directory of Open Access Journals (Sweden)

    Neil D. Barrie

    2016-05-01

    Full Text Available We propose a new class of natural inflation models based on a hidden scale invariance. In a very generic Wilsonian effective field theory with an arbitrary number of scalar fields, which exhibits scale invariance via the dilaton, the potential necessarily contains a flat direction in the classical limit. This flat direction is lifted by small quantum corrections and inflation is realised without need for an unnatural fine-tuning. In the conformal limit, the effective potential becomes linear in the inflaton field, yielding to specific predictions for the spectral index and the tensor-to-scalar ratio, being respectively: ns−1≈−0.025(N⋆60−1 and r≈0.0667(N⋆60−1, where N⋆≈30–65 is a number of efolds during observable inflation. This predictions are in reasonable agreement with cosmological measurements. Further improvement of the accuracy of these measurements may turn out to be critical in falsifying our scenario.

  1. Detecting hidden sources-STUK/HUT team

    Energy Technology Data Exchange (ETDEWEB)

    Nikkinen, M.; Aarnio, P. [Helsinki Univ. of Technology, Espoo (Finland); Honkamaa, T.; Tiilikainen, H. [Finnish Centre for Radiation and Nuclear Safety, Helsinki (Finland)

    1997-12-31

    The task of the team was to locate and to identify hidden sources in a specified area in Padasjoki Auttoinen village. The team used AB-420 helicopter of the Finnish Frontier Guard. The team had two measuring systems: HPGe system (relative efficiency 18%) and 5`x5` NaI system. The team found two sources in real-time and additional two sources after 24 h analysis time. After the locations and characteristics of the sources were announced it was found out that altogether six sources would have been possible to find using the measured data. The total number of sources was ten. The NaI detector was good at detecting and locating the sources and HPGe was most useful in identification and calculation of the activity estimates. The following development should be made: 1) larger detectors are needed, 2) the software has to be improved. (This has been performed after the exercise) and 3) the navigation must be based on DGPS. visual navigation causes easily gaps between the flight lines and some sources may not be detected. (au).

  2. Gauging hidden symmetries in two dimensions

    International Nuclear Information System (INIS)

    Samtleben, Henning; Weidner, Martin

    2007-01-01

    We initiate the systematic construction of gauged matter-coupled supergravity theories in two dimensions. Subgroups of the affine global symmetry group of toroidally compactified supergravity can be gauged by coupling vector fields with minimal couplings and a particular topological term. The gauge groups typically include hidden symmetries that are not among the target-space isometries of the ungauged theory. The gaugings constructed in this paper are described group-theoretically in terms of a constant embedding tensor subject to a number of constraints which parametrizes the different theories and entirely encodes the gauged Lagrangian. The prime example is the bosonic sector of the maximally supersymmetric theory whose ungauged version admits an affine e 9 global symmetry algebra. The various parameters (related to higher-dimensional p-form fluxes, geometric and non-geometric fluxes, etc.) which characterize the possible gaugings, combine into an embedding tensor transforming in the basic representation of e 9 . This yields an infinite-dimensional class of maximally supersymmetric theories in two dimensions. We work out and discuss several examples of higher-dimensional origin which can be systematically analyzed using the different gradings of e 9

  3. Academic mobbing: hidden health hazard at workplace.

    Science.gov (United States)

    Khoo, Sb

    2010-01-01

    Academic mobbing is a non-violent, sophisticated, 'ganging up' behaviour adopted by academicians to "wear and tear" a colleague down emotionally through unjustified accusation, humiliation, general harassment and emotional abuse. These are directed at the target under a veil of lies and justifications so that they are "hidden" to others and difficult to prove. Bullies use mobbing activities to hide their own weaknesses and incompetence. Targets selected are often intelligent, innovative high achievers, with good integrity and principles. Mobbing activities appear trivial and innocuous on its own but the frequency and pattern of their occurrence over long period of time indicates an aggressive manipulation to "eliminate" the target. Mobbing activities typically progress through five stereotypical phases that begins with an unsolved minor conflict between two workers and ultimately escalates into a senseless mobbing whereby the target is stigmatized and victimized to justify the behaviours of the bullies. The result is always physical, mental, social distress or illness and, most often, expulsion of target from the workplace. Organizations are subjected to great financial loss, loss of key workers and a tarnished public image and reputation. Public awareness, education, effective counselling, establishment of anti-bullying policies and legislations at all levels are necessary to curb academic mobbing. General practitioners (GPs) play an important role in supporting patients subjected to mental and physical health injury caused by workplace bullying and mobbing.

  4. Detecting hidden sources-STUK/HUT team

    Energy Technology Data Exchange (ETDEWEB)

    Nikkinen, M; Aarnio, P [Helsinki Univ. of Technology, Espoo (Finland); Honkamaa, T; Tiilikainen, H [Finnish Centre for Radiation and Nuclear Safety, Helsinki (Finland)

    1998-12-31

    The task of the team was to locate and to identify hidden sources in a specified area in Padasjoki Auttoinen village. The team used AB-420 helicopter of the Finnish Frontier Guard. The team had two measuring systems: HPGe system (relative efficiency 18%) and 5`x5` NaI system. The team found two sources in real-time and additional two sources after 24 h analysis time. After the locations and characteristics of the sources were announced it was found out that altogether six sources would have been possible to find using the measured data. The total number of sources was ten. The NaI detector was good at detecting and locating the sources and HPGe was most useful in identification and calculation of the activity estimates. The following development should be made: 1) larger detectors are needed, 2) the software has to be improved. (This has been performed after the exercise) and 3) the navigation must be based on DGPS. visual navigation causes easily gaps between the flight lines and some sources may not be detected. (au).

  5. Hidden-Sector Dynamics and the Supersymmetric Seesaw

    CERN Document Server

    Campbell, Bruce A; Maybury, David W

    2008-01-01

    In light of recent analyses that have shown that nontrivial hidden-sector dynamics in models of supersymmetry breaking can lead to a significant impact on the predicted low-energy supersymmetric spectrum, we extend these studies to consider hidden-sector effects in extensions of the MSSM to include a seesaw model for neutrino masses. A dynamical hidden sector in an interval of mass scales below the seesaw scale would yield renormalization-group running involving both the anomalous dimension from the hidden sector and the seesaw-extended MSSM renormalization group equations (RGEs). These effects interfere in general, altering the generational mixing of the sleptons, and allowing for a substantial change to the expected level of charged-lepton flavour violation in seesaw-extended MSSM models. These results provide further support for recent theoretical observations that knowledge of the hidden sector is required in order to make concrete low-energy predictions, if the hidden sector is strongly coupled. In parti...

  6. A single hidden layer feedforward network with only one neuron in the hidden layer can approximate any univariate function

    OpenAIRE

    Guliyev , Namig; Ismailov , Vugar

    2016-01-01

    The possibility of approximating a continuous function on a compact subset of the real line by a feedforward single hidden layer neural network with a sigmoidal activation function has been studied in many papers. Such networks can approximate an arbitrary continuous function provided that an unlimited number of neurons in a hidden layer is permitted. In this paper, we consider constructive approximation on any finite interval of $\\mathbb{R}$ by neural networks with only one neuron in the hid...

  7. Defined contribution health benefits.

    Science.gov (United States)

    Fronstin, P

    2001-03-01

    This Issue Brief discusses the emerging issue of "defined contribution" (DC) health benefits. The term "defined contribution" is used to describe a wide variety of approaches to the provision of health benefits, all of which have in common a shift in the responsibility for payment and selection of health care services from employers to employees. DC health benefits often are mentioned in the context of enabling employers to control their outlay for health benefits by avoiding increases in health care costs. DC health benefits may also shift responsibility for choosing a health plan and the associated risks of choosing a plan from employers to employees. There are three primary reasons why some employers currently are considering some sort of DC approach. First, they are once again looking for ways to keep their health care cost increases in line with overall inflation. Second, some employers are concerned that the public "backlash" against managed care will result in new legislation, regulations, and litigation that will further increase their health care costs if they do not distance themselves from health care decisions. Third, employers have modified not only most employee benefit plans, but labor market practices in general, by giving workers more choice, control, and flexibility. DC-type health benefits have existed as cafeteria plans since the 1980s. A cafeteria plan gives each employee the opportunity to determine the allocation of his or her total compensation (within employer-defined limits) among various employee benefits (primarily retirement or health). Most types of DC health benefits currently being discussed could be provided within the existing employment-based health insurance system, with or without the use of cafeteria plans. They could also allow employees to purchase health insurance directly from insurers, or they could drive new technologies and new forms of risk pooling through which health care services are provided and financed. DC health

  8. On Defining Mass

    Science.gov (United States)

    Hecht, Eugene

    2011-01-01

    Though central to any pedagogical development of physics, the concept of mass is still not well understood. Properly defining mass has proven to be far more daunting than contemporary textbooks would have us believe. And yet today the origin of mass is one of the most aggressively pursued areas of research in all of physics. Much of the excitement surrounding the Large Hadron Collider at CERN is associated with discovering the mechanism responsible for the masses of the elementary particles. This paper will first briefly examine the leading definitions, pointing out their shortcomings. Then, utilizing relativity theory, it will propose—for consideration by the community of physicists—a conceptual definition of mass predicated on the more fundamental concept of energy, more fundamental in that everything that has mass has energy, yet not everything that has energy has mass.

  9. Implementing Software Defined Radio

    CERN Document Server

    Grayver, Eugene

    2013-01-01

    Software Defined Radio makes wireless communications easier, more efficient, and more reliable. This book bridges the gap between academic research and practical implementation. When beginning a project, practicing engineers, technical managers, and graduate students can save countless hours by considering the concepts presented in these pages. The author covers the myriad options and trade-offs available when selecting an appropriate hardware architecture. As demonstrated here, the choice between hardware- and software-centric architecture can mean the difference between meeting an aggressive schedule and bogging down in endless design iterations. Because of the author’s experience overseeing dozens of failed and successful developments, he is able to present many real-life examples. Some of the key concepts covered are: Choosing the right architecture for the market – laboratory, military, or commercial Hardware platforms – FPGAs, GPPs, specialized and hybrid devices Standardization efforts to ens...

  10. Defining cyber warfare

    Directory of Open Access Journals (Sweden)

    Dragan D. Mladenović

    2012-04-01

    Full Text Available Cyber conflicts represent a new kind of warfare that is technologically developing very rapidly. Such development results in more frequent and more intensive cyber attacks undertaken by states against adversary targets, with a wide range of diverse operations, from information operations to physical destruction of targets. Nevertheless, cyber warfare is waged through the application of the same means, techniques and methods as those used in cyber criminal, terrorism and intelligence activities. Moreover, it has a very specific nature that enables states to covertly initiate attacks against their adversaries. The starting point in defining doctrines, procedures and standards in the area of cyber warfare is determining its true nature. In this paper, a contribution to this effort was made through the analysis of the existing state doctrines and international practice in the area of cyber warfare towards the determination of its nationally acceptable definition.

  11. Defining the mobilome.

    Science.gov (United States)

    Siefert, Janet L

    2009-01-01

    This chapter defines the agents that provide for the movement of genetic material which fuels the adaptive potential of life on our planet. The chapter has been structured to be broadly comprehensive, arbitrarily categorizing the mobilome into four classes: (1) transposons, (2) plasmids, (3) bacteriophage, and (4) self-splicing molecular parasites.Our increasing understanding of the mobilome is as dynamic as the mobilome itself. With continuing discovery, it is clear that nature has not confined these genomic agents of change to neat categories, but rather the classification categories overlap and intertwine. Massive sequencing efforts and their published analyses are continuing to refine our understanding of the extent of the mobilome. This chapter provides a framework to describe our current understanding of the mobilome and a foundation on which appreciation of its impact on genome evolution can be understood.

  12. Software Defined Networking

    DEFF Research Database (Denmark)

    Caba, Cosmin Marius

    Network Service Providers (NSP) often choose to overprovision their networks instead of deploying proper Quality of Services (QoS) mechanisms that allow for traffic differentiation and predictable quality. This tendency of overprovisioning is not sustainable for the simple reason that network...... resources are limited. Hence, to counteract this trend, current QoS mechanisms must become simpler to deploy and operate, in order to motivate NSPs to employ QoS techniques instead of overprovisioning. Software Defined Networking (SDN) represents a paradigm shift in the way telecommunication and data...... generic perspective (e.g. service provisioning speed, resources availability). As a result, new mechanisms for providing QoS are proposed, solutions for SDN-specific QoS challenges are designed and tested, and new network management concepts are prototyped, all aiming to improve QoS for network services...

  13. Hidden burden of malaria in Indian women

    Directory of Open Access Journals (Sweden)

    Sharma Vinod P

    2009-12-01

    Full Text Available Abstract Malaria is endemic in India with an estimated 70-100 million cases each year (1.6-1.8 million reported by NVBDCP; of this 50-55% are Plasmodium vivax and 45-50% Plasmodium falciparum. A recent study on malaria in pregnancy reported from undivided Madhya Pradesh state (includes Chhattisgarh state, that an estimated over 220,000 pregnant women contract malaria infection each year. Malaria in pregnancy caused- abortions 34.5%; stillbirths 9%; and maternal deaths 0.45%. Bulk of this tragic outcome can be averted by following the Roll Back Malaria/WHO recommendations of the use of malaria prevention i.e. indoor residual spraying (IRS/insecticide-treated bed nets (ITN preferably long-lasting treated bed nets (LLIN; intermittent preventive therapy (IPT; early diagnosis, prompt and complete treatment using microscopic/malaria rapid diagnostics test (RDT and case management. High incidence in pregnancy has arisen because of malaria surveillance lacking coverage, lack of age and sex wise data, staff shortages, and intermittent preventive treatment (IPT applicable in high transmission states/pockets is not included in the national drug policy- an essential component of fighting malaria in pregnancy in African settings. Inadequate surveillance and gross under-reporting has been highlighted time and again for over three decades. As a result the huge problem of malaria in pregnancy reported occasionally by researchers has remained hidden. Malaria in pregnancy may quicken severity in patients with drug resistant parasites, anaemia, endemic poverty, and malnutrition. There is, therefore, urgent need to streamline malaria control strategies to make a difference in tackling this grim scenario in human health.

  14. Hydrogeophysical investigations at Hidden Dam, Raymond, California

    Science.gov (United States)

    Minsley, Burke J.; Burton, Bethany L.; Ikard, Scott; Powers, Michael H.

    2011-01-01

    Self-potential and direct current resistivity surveys are carried out at the Hidden Dam site in Raymond, California to assess present-day seepage patterns and better understand the hydrogeologic mechanisms that likely influence seepage. Numerical modeling is utilized in conjunction with the geophysical measurements to predict variably-saturated flow through typical two-dimensional dam cross-sections as a function of reservoir elevation. Several different flow scenarios are investigated based on the known hydrogeology, as well as information about typical subsurface structures gained from the resistivity survey. The flow models are also used to simulate the bulk electrical resistivity in the subsurface under varying saturation conditions, as well as the self-potential response using petrophysical relationships and electrokinetic coupling equations.The self-potential survey consists of 512 measurements on the downstream area of the dam, and corroborates known seepage areas on the northwest side of the dam. Two direct-current resistivity profiles, each approximately 2,500 ft (762 m) long, indicate a broad sediment channel under the northwest side of the dam, which may be a significant seepage pathway through the foundation. A focusing of seepage in low-topography areas downstream of the dam is confirmed from the numerical flow simulations, which is also consistent with past observations. Little evidence of seepage is identified from the self-potential data on the southeast side of the dam, also consistent with historical records, though one possible area of focused seepage is identified near the outlet works. Integration of the geophysical surveys, numerical modeling, and observation well data provides a framework for better understanding seepage at the site through a combined hydrogeophysical approach.

  15. 'Hidden messages' emerging from Afrocentric management perspectives

    Directory of Open Access Journals (Sweden)

    H. Van den Heuvel

    2008-12-01

    Full Text Available Purpose: This paper aims to examine how 'African management' discourse has emerged in South Africa. Altogether, it has stimulated debates - sometimes in controversial ways - on 'taboo issues', e.g. relating to 'cultural diversity' and 'ethnicity'. The stimulation of such debates within organisations is probably a more valuable contribution than a static, essentialised 'African identity' that it proclaims. Design/Methodology/Approach: The paper draws on a qualitative research project conducted in South Africa in 2003-2004. Its relevance lies in gaining in-depth insights into ('non-western' local management discourse. It seeks to contribute to the body of knowledge on political and cultural contexts in which South African organizations operate, and how they impact on local management perspectives, and vice versa. Findings: The research findings make clear how and under what circumstances 'African management' discourse has come about in South Africa, and how it could be interpreted. Implications: 'African management' advocates allegedly attempt to revise dominant management thinking and promote 'humane-ness' and participatory decision-making in South African organisations, in search of a contextualised management approach. Amongst others, it has produced new meanings of 'Africanness' and has opened up space for 'hidden messages', resentments and aspirations to become openly articulated. This throws another light on phenomena such as cultural diversity and ethnicity that usually tend to be 'neutralised'. This may turn out to be far healthier for blooming organisational cultures in South Africa than relentlessly hammering on prescribed 'corporate values'. Originality/Value: This paper informs the reader in detail about the emergence and evolvement of 'African management' discourse in South Africa. It is a unique attempt to develop an interpretative viewpoint on this intriguing phenomenon that offers a potentially valuable contribution in reading

  16. Identifying hidden voice and video streams

    Science.gov (United States)

    Fan, Jieyan; Wu, Dapeng; Nucci, Antonio; Keralapura, Ram; Gao, Lixin

    2009-04-01

    Given the rising popularity of voice and video services over the Internet, accurately identifying voice and video traffic that traverse their networks has become a critical task for Internet service providers (ISPs). As the number of proprietary applications that deliver voice and video services to end users increases over time, the search for the one methodology that can accurately detect such services while being application independent still remains open. This problem becomes even more complicated when voice and video service providers like Skype, Microsoft, and Google bundle their voice and video services with other services like file transfer and chat. For example, a bundled Skype session can contain both voice stream and file transfer stream in the same layer-3/layer-4 flow. In this context, traditional techniques to identify voice and video streams do not work. In this paper, we propose a novel self-learning classifier, called VVS-I , that detects the presence of voice and video streams in flows with minimum manual intervention. Our classifier works in two phases: training phase and detection phase. In the training phase, VVS-I first extracts the relevant features, and subsequently constructs a fingerprint of a flow using the power spectral density (PSD) analysis. In the detection phase, it compares the fingerprint of a flow to the existing fingerprints learned during the training phase, and subsequently classifies the flow. Our classifier is not only capable of detecting voice and video streams that are hidden in different flows, but is also capable of detecting different applications (like Skype, MSN, etc.) that generate these voice/video streams. We show that our classifier can achieve close to 100% detection rate while keeping the false positive rate to less that 1%.

  17. THE COMPLEX OF ASSUMPTION CATHEDRAL OF THE ASTRAKHAN KREMLIN

    Directory of Open Access Journals (Sweden)

    Savenkova Aleksandra Igorevna

    2016-08-01

    Full Text Available This article is devoted to an architectural and historical analysis of the constructions forming a complex of Assumption Cathedral of the Astrakhan Kremlin, which earlier hasn’t been considered as a subject of special research. Basing on the archival sources, photographic materials, publications and on-site investigations of monuments, the creation history of the complete architectural complex sustained in one style of the Muscovite baroque, unique in its composite construction, is considered. Its interpretation in the all-Russian architectural context is offered. Typological features of single constructions come to light. The typology of the Prechistinsky bell tower has an untypical architectural solution - “hexagonal structure on octagonal and quadrangular structures”. The way of connecting the building of the Cathedral and the chambers by the passage was characteristic of monastic constructions and was exclusively seldom in kremlins, farmsteads and ensembles of city cathedrals. The composite scheme of the Assumption Cathedral includes the Lobnoye Mesto (“the Place of Execution” located on an axis from the West, it is connected with the main building by a quarter-turn with landing. The only prototype of the structure is a Lobnoye Mesto on the Red Square in Moscow. In the article the version about the emergence of the Place of Execution on the basis of earlier existing construction - a tower “the Peal” which is repeatedly mentioned in written sources in connection with S. Razin’s revolt is considered. The metropolitan Sampson, trying to keep the value of the Astrakhan metropolitanate, builds the Assumption Cathedral and the Place of Execution directly appealing to a capital prototype to emphasize the continuity and close connection with Moscow.

  18. Are Prescription Opioids Driving the Opioid Crisis? Assumptions vs Facts.

    Science.gov (United States)

    Rose, Mark Edmund

    2018-04-01

    Sharp increases in opioid prescriptions, and associated increases in overdose deaths in the 2000s, evoked widespread calls to change perceptions of opioid analgesics. Medical literature discussions of opioid analgesics began emphasizing patient and public health hazards. Repetitive exposure to this information may influence physician assumptions. While highly consequential to patients with pain whose function and quality of life may benefit from opioid analgesics, current assumptions about prescription opioid analgesics, including their role in the ongoing opioid overdose epidemic, have not been scrutinized. Information was obtained by searching PubMed, governmental agency websites, and conference proceedings. Opioid analgesic prescribing and associated overdose deaths both peaked around 2011 and are in long-term decline; the sharp overdose increase recorded in 2014 was driven by illicit fentanyl and heroin. Nonmethadone prescription opioid analgesic deaths, in the absence of co-ingested benzodiazepines, alcohol, or other central nervous system/respiratory depressants, are infrequent. Within five years of initial prescription opioid misuse, 3.6% initiate heroin use. The United States consumes 80% of the world opioid supply, but opioid access is nonexistent for 80% and severely restricted for 4.1% of the global population. Many current assumptions about opioid analgesics are ill-founded. Illicit fentanyl and heroin, not opioid prescribing, now fuel the current opioid overdose epidemic. National discussion has often neglected the potentially devastating effects of uncontrolled chronic pain. Opioid analgesic prescribing and related overdoses are in decline, at great cost to patients with pain who have benefited or may benefit from, but cannot access, opioid analgesic therapy.

  19. Radiation hormesis and the linear-no-threshold assumption

    CERN Document Server

    Sanders, Charles L

    2009-01-01

    Current radiation protection standards are based upon the application of the linear no-threshold (LNT) assumption, which considers that even very low doses of ionizing radiation can cause cancer. The radiation hormesis hypothesis, by contrast, proposes that low-dose ionizing radiation is beneficial. In this book, the author examines all facets of radiation hormesis in detail, including the history of the concept and mechanisms, and presents comprehensive, up-to-date reviews for major cancer types. It is explained how low-dose radiation can in fact decrease all-cause and all-cancer mortality an

  20. First assumptions and overlooking competing causes of death

    DEFF Research Database (Denmark)

    Leth, Peter Mygind; Andersen, Anh Thao Nguyen

    2014-01-01

    Determining the most probable cause of death is important, and it is sometimes tempting to assume an obvious cause of death, when it readily presents itself, and stop looking for other competing causes of death. The case story presented in the article illustrates this dilemma. The first assumption...... of cause of death, which was based on results from bacteriology tests, proved to be wrong when the results from the forensic toxicology testing became available. This case also illustrates how post mortem computed tomography (PMCT) findings of radio opaque material in the stomach alerted the pathologist...

  1. Assumptions of Corporate Social Responsibility as Competitiveness Factor

    Directory of Open Access Journals (Sweden)

    Zaneta Simanaviciene

    2017-09-01

    Full Text Available The purpose of this study was to examine the assumptions of corporate social responsibility (CSR as competitiveness factor in economic downturn. Findings indicate that factors affecting the quality of the micro-economic business environment, i.e., the sophistication of enterprise’s strategy and management processes, the quality of the human capital resources, the increase of product / service demand, the development of related and supporting sectors and the efficiency of natural resources, and competitive capacities of enterprise impact competitiveness at a micro-level. The outcomes suggest that the implementation of CSR elements, i.e., economic, environmental and social responsibilities, gives good opportunities to increase business competitiveness.

  2. ψ -ontology result without the Cartesian product assumption

    Science.gov (United States)

    Myrvold, Wayne C.

    2018-05-01

    We introduce a weakening of the preparation independence postulate of Pusey et al. [Nat. Phys. 8, 475 (2012), 10.1038/nphys2309] that does not presuppose that the space of ontic states resulting from a product-state preparation can be represented by the Cartesian product of subsystem state spaces. On the basis of this weakened assumption, it is shown that, in any model that reproduces the quantum probabilities, any pair of pure quantum states |ψ >,|ϕ > with ≤1 /√{2 } must be ontologically distinct.

  3. Unconditionally Secure and Universally Composable Commitments from Physical Assumptions

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Scafuro, Alessandra

    2013-01-01

    We present a constant-round unconditional black-box compiler that transforms any ideal (i.e., statistically-hiding and statistically-binding) straight-line extractable commitment scheme, into an extractable and equivocal commitment scheme, therefore yielding to UC-security [9]. We exemplify the u...... of unconditional UC-security with (malicious) PUFs and stateless tokens, our compiler can be instantiated with any ideal straight-line extractable commitment scheme, thus allowing the use of various setup assumptions which may better fit the application or the technology available....

  4. Increased taxon sampling reveals thousands of hidden orthologs in flatworms

    Science.gov (United States)

    2017-01-01

    Gains and losses shape the gene complement of animal lineages and are a fundamental aspect of genomic evolution. Acquiring a comprehensive view of the evolution of gene repertoires is limited by the intrinsic limitations of common sequence similarity searches and available databases. Thus, a subset of the gene complement of an organism consists of hidden orthologs, i.e., those with no apparent homology to sequenced animal lineages—mistakenly considered new genes—but actually representing rapidly evolving orthologs or undetected paralogs. Here, we describe Leapfrog, a simple automated BLAST pipeline that leverages increased taxon sampling to overcome long evolutionary distances and identify putative hidden orthologs in large transcriptomic databases by transitive homology. As a case study, we used 35 transcriptomes of 29 flatworm lineages to recover 3427 putative hidden orthologs, some unidentified by OrthoFinder and HaMStR, two common orthogroup inference algorithms. Unexpectedly, we do not observe a correlation between the number of putative hidden orthologs in a lineage and its “average” evolutionary rate. Hidden orthologs do not show unusual sequence composition biases that might account for systematic errors in sequence similarity searches. Instead, gene duplication with divergence of one paralog and weak positive selection appear to underlie hidden orthology in Platyhelminthes. By using Leapfrog, we identify key centrosome-related genes and homeodomain classes previously reported as absent in free-living flatworms, e.g., planarians. Altogether, our findings demonstrate that hidden orthologs comprise a significant proportion of the gene repertoire in flatworms, qualifying the impact of gene losses and gains in gene complement evolution. PMID:28400424

  5. Defining the Anthropocene

    Science.gov (United States)

    Lewis, Simon; Maslin, Mark

    2016-04-01

    Time is divided by geologists according to marked shifts in Earth's state. Recent global environmental changes suggest that Earth may have entered a new human-dominated geological epoch, the Anthropocene. Should the Anthropocene - the idea that human activity is a force acting upon the Earth system in ways that mean that Earth will be altered for millions of years - be defined as a geological time-unit at the level of an Epoch? Here we appraise the data to assess such claims, first in terms of changes to the Earth system, with particular focus on very long-lived impacts, as Epochs typically last millions of years. Can Earth really be said to be in transition from one state to another? Secondly, we then consider the formal criteria used to define geological time-units and move forward through time examining whether currently available evidence passes typical geological time-unit evidence thresholds. We suggest two time periods likely fit the criteria (1) the aftermath of the interlinking of the Old and New Worlds, which moved species across continents and ocean basins worldwide, a geologically unprecedented and permanent change, which is also the globally synchronous coolest part of the Little Ice Age (in Earth system terms), and the beginning of global trade and a new socio-economic "world system" (in historical terms), marked as a golden spike by a temporary drop in atmospheric CO2, centred on 1610 CE; and (2) the aftermath of the Second World War, when many global environmental changes accelerated and novel long-lived materials were increasingly manufactured, known as the Great Acceleration (in Earth system terms) and the beginning of the Cold War (in historical terms), marked as a golden spike by the peak in radionuclide fallout in 1964. We finish by noting that the Anthropocene debate is politically loaded, thus transparency in the presentation of evidence is essential if a formal definition of the Anthropocene is to avoid becoming a debate about bias. The

  6. Teleology and Defining Sex.

    Science.gov (United States)

    Gamble, Nathan K; Pruski, Michal

    2018-07-01

    Disorders of sexual differentiation lead to what is often referred to as an intersex state. This state has medical, as well as some legal, recognition. Nevertheless, the question remains whether intersex persons occupy a state in between maleness and femaleness or whether they are truly men or women. To answer this question, another important conundrum needs to be first solved: what defines sex? The answer seems rather simple to most people, yet when morphology does not coincide with haplotypes, and genetics might not correlate with physiology the issue becomes more complex. This paper tackles both issues by establishing where the essence of sex is located and by superimposing that framework onto the issue of the intersex. This is achieved through giving due consideration to the biology of sexual development, as well as through the use of a teleological framework of the meaning of sex. Using a range of examples, the paper establishes that sex cannot be pinpointed to one biological variable but is rather determined by how the totality of one's biology is oriented towards biological reproduction. A brief consideration is also given to the way this situation could be comprehended from a Christian understanding of sex and suffering.

  7. Basic concepts and assumptions behind the new ICRP recommendations

    International Nuclear Information System (INIS)

    Lindell, B.

    1979-01-01

    A review is given of some of the basic concepts and assumptions behind the current recommendations by the International Commission on Radiological Protection in ICRP Publications 26 and 28, which form the basis for the revision of the Basic Safety Standards jointly undertaken by IAEA, ILO, NEA and WHO. Special attention is given to the assumption of a linear, non-threshold dose-response relationship for stochastic radiation effects such as cancer and hereditary harm. The three basic principles of protection are discussed: justification of practice, optimization of protection and individual risk limitation. In the new ICRP recommendations particular emphasis is given to the principle of keeping all radiation doses as low as is reasonably achievable. A consequence of this is that the ICRP dose limits are now given as boundary conditions for the justification and optimization procedures rather than as values that should be used for purposes of planning and design. The fractional increase in total risk at various ages after continuous exposure near the dose limits is given as an illustration. The need for taking other sources, present and future, into account when applying the dose limits leads to the use of the commitment concept. This is briefly discussed as well as the new quantity, the effective dose equivalent, introduced by ICRP. (author)

  8. Stable isotopes and elasmobranchs: tissue types, methods, applications and assumptions.

    Science.gov (United States)

    Hussey, N E; MacNeil, M A; Olin, J A; McMeans, B C; Kinney, M J; Chapman, D D; Fisk, A T

    2012-04-01

    Stable-isotope analysis (SIA) can act as a powerful ecological tracer with which to examine diet, trophic position and movement, as well as more complex questions pertaining to community dynamics and feeding strategies or behaviour among aquatic organisms. With major advances in the understanding of the methodological approaches and assumptions of SIA through dedicated experimental work in the broader literature coupled with the inherent difficulty of studying typically large, highly mobile marine predators, SIA is increasingly being used to investigate the ecology of elasmobranchs (sharks, skates and rays). Here, the current state of SIA in elasmobranchs is reviewed, focusing on available tissues for analysis, methodological issues relating to the effects of lipid extraction and urea, the experimental dynamics of isotopic incorporation, diet-tissue discrimination factors, estimating trophic position, diet and mixing models and individual specialization and niche-width analyses. These areas are discussed in terms of assumptions made when applying SIA to the study of elasmobranch ecology and the requirement that investigators standardize analytical approaches. Recommendations are made for future SIA experimental work that would improve understanding of stable-isotope dynamics and advance their application in the study of sharks, skates and rays. © 2012 The Authors. Journal of Fish Biology © 2012 The Fisheries Society of the British Isles.

  9. Has the "Equal Environments" assumption been tested in twin studies?

    Science.gov (United States)

    Eaves, Lindon; Foley, Debra; Silberg, Judy

    2003-12-01

    A recurring criticism of the twin method for quantifying genetic and environmental components of human differences is the necessity of the so-called "equal environments assumption" (EEA) (i.e., that monozygotic and dizygotic twins experience equally correlated environments). It has been proposed to test the EEA by stratifying twin correlations by indices of the amount of shared environment. However, relevant environments may also be influenced by genetic differences. We present a model for the role of genetic factors in niche selection by twins that may account for variation in indices of the shared twin environment (e.g., contact between members of twin pairs). Simulations reveal that stratification of twin correlations by amount of contact can yield spurious evidence of large shared environmental effects in some strata and even give false indications of genotype x environment interaction. The stratification approach to testing the equal environments assumption may be misleading and the results of such tests may actually be consistent with a simpler theory of the role of genetic factors in niche selection.

  10. Halo-Independent Direct Detection Analyses Without Mass Assumptions

    CERN Document Server

    Anderson, Adam J.; Kahn, Yonatan; McCullough, Matthew

    2015-10-06

    Results from direct detection experiments are typically interpreted by employing an assumption about the dark matter velocity distribution, with results presented in the $m_\\chi-\\sigma_n$ plane. Recently methods which are independent of the DM halo velocity distribution have been developed which present results in the $v_{min}-\\tilde{g}$ plane, but these in turn require an assumption on the dark matter mass. Here we present an extension of these halo-independent methods for dark matter direct detection which does not require a fiducial choice of the dark matter mass. With a change of variables from $v_{min}$ to nuclear recoil momentum ($p_R$), the full halo-independent content of an experimental result for any dark matter mass can be condensed into a single plot as a function of a new halo integral variable, which we call $\\tilde{h}(p_R)$. The entire family of conventional halo-independent $\\tilde{g}(v_{min})$ plots for all DM masses are directly found from the single $\\tilde{h}(p_R)$ plot through a simple re...

  11. Defining an emerging disease.

    Science.gov (United States)

    Moutou, F; Pastoret, P-P

    2015-04-01

    Defining an emerging disease is not straightforward, as there are several different types of disease emergence. For example, there can be a 'real' emergence of a brand new disease, such as the emergence of bovine spongiform encephalopathy in the 1980s, or a geographic emergence in an area not previously affected, such as the emergence of bluetongue in northern Europe in 2006. In addition, disease can emerge in species formerly not considered affected, e.g. the emergence of bovine tuberculosis in wildlife species since 2000 in France. There can also be an unexpected increase of disease incidence in a known area and a known species, or there may simply be an increase in our knowledge or awareness of a particular disease. What all these emerging diseases have in common is that human activity frequently has a role to play in their emergence. For example, bovine spongiform encephalopathy very probably emerged as a result of changes in the manufacturing of meat-and-bone meal, bluetongue was able to spread to cooler climes as a result of uncontrolled trade in animals, and a relaxation of screening and surveillance for bovine tuberculosis enabled the disease to re-emerge in areas that had been able to drastically reduce the number of cases. Globalisation and population growth will continue to affect the epidemiology of diseases in years to come and ecosystems will continue to evolve. Furthermore, new technologies such as metagenomics and high-throughput sequencing are identifying new microorganisms all the time. Change is the one constant, and diseases will continue to emerge, and we must consider the causes and different types of emergence as we deal with these diseases in the future.

  12. Infinite hidden conditional random fields for human behavior analysis.

    Science.gov (United States)

    Bousmalis, Konstantinos; Zafeiriou, Stefanos; Morency, Louis-Philippe; Pantic, Maja

    2013-01-01

    Hidden conditional random fields (HCRFs) are discriminative latent variable models that have been shown to successfully learn the hidden structure of a given classification problem (provided an appropriate validation of the number of hidden states). In this brief, we present the infinite HCRF (iHCRF), which is a nonparametric model based on hierarchical Dirichlet processes and is capable of automatically learning the optimal number of hidden states for a classification task. We show how we learn the model hyperparameters with an effective Markov-chain Monte Carlo sampling technique, and we explain the process that underlines our iHCRF model with the Restaurant Franchise Rating Agencies analogy. We show that the iHCRF is able to converge to a correct number of represented hidden states, and outperforms the best finite HCRFs--chosen via cross-validation--for the difficult tasks of recognizing instances of agreement, disagreement, and pain. Moreover, the iHCRF manages to achieve this performance in significantly less total training, validation, and testing time.

  13. Hidden Statistics Approach to Quantum Simulations

    Science.gov (United States)

    Zak, Michail

    2010-01-01

    Recent advances in quantum information theory have inspired an explosion of interest in new quantum algorithms for solving hard computational (quantum and non-quantum) problems. The basic principle of quantum computation is that the quantum properties can be used to represent structure data, and that quantum mechanisms can be devised and built to perform operations with this data. Three basic non-classical properties of quantum mechanics superposition, entanglement, and direct-product decomposability were main reasons for optimism about capabilities of quantum computers that promised simultaneous processing of large massifs of highly correlated data. Unfortunately, these advantages of quantum mechanics came with a high price. One major problem is keeping the components of the computer in a coherent state, as the slightest interaction with the external world would cause the system to decohere. That is why the hardware implementation of a quantum computer is still unsolved. The basic idea of this work is to create a new kind of dynamical system that would preserve the main three properties of quantum physics superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods. In other words, such a system would reinforce the advantages and minimize limitations of both quantum and classical aspects. Based upon a concept of hidden statistics, a new kind of dynamical system for simulation of Schroedinger equation is proposed. The system represents a modified Madelung version of Schroedinger equation. It preserves superposition, entanglement, and direct-product decomposability while allowing one to measure its state variables using classical methods. Such an optimal combination of characteristics is a perfect match for simulating quantum systems. The model includes a transitional component of quantum potential (that has been overlooked in previous treatment of the Madelung equation). The role of the

  14. Hidden beauty baryon states in the local hidden gauge approach with heavy quark spin symmetry

    Energy Technology Data Exchange (ETDEWEB)

    Xiao, C.W.; Oset, E. [Centro Mixto Universidad de Valencia-CSIC, Institutos de Investigacion de Paterna, Departamento de Fisica Teorica and IFIC, Valencia (Spain)

    2013-11-15

    Using a coupled-channel unitary approach, combining the heavy quark spin symmetry and the dynamics of the local hidden gauge, we investigate the meson-baryon interaction with hidden beauty and obtain several new states of N around 11 GeV. We consider the basis of states {eta}{sub b} N, {Upsilon};N, B {Lambda}{sub b}, B {Sigma}{sub b}, B{sup *}{Lambda}{sub b}, B{sup *}{Sigma}{sub b}, B{sup *}{Sigma}{sub b}{sup *} and find four basic bound states which correspond to B {Sigma}{sub b}, B {Sigma}{sub b}{sup *}, B{sup *}{Sigma}{sub b} and B{sup *}{Sigma}{sub b}{sup *}, decaying mostly into {eta}{sub b} N and {Upsilon}N and with a binding energy about 50-130 MeV with respect to the thresholds of the corresponding channel. All of them have isospin I = 1/2, and we find no bound states or resonances in I = 3/2. The B {Sigma}{sub b} state appears in J = 1/2, the B {Sigma}{sub b}{sup *} in J = 3/2, the B{sup *}{Sigma}{sub b} appears nearly degenerate in J = 1/2, 3/2 and the B{sup *}{Sigma}{sub b}{sup *} appears nearly degenerate in J = 1/2, 3/2, 5/2. These states have a width from 2-110 MeV, with conservative estimates of uncertainties, except for the one in J = 5/2 which has zero width since it cannot decay into any of the states of the basis chosen. We make generous estimates of the uncertainties and find that within very large margins these states appear bound. (orig.)

  15. Epigenetic change detection and pattern recognition via Bayesian hierarchical hidden Markov models.

    Science.gov (United States)

    Wang, Xinlei; Zang, Miao; Xiao, Guanghua

    2013-06-15

    Epigenetics is the study of changes to the genome that can switch genes on or off and determine which proteins are transcribed without altering the DNA sequence. Recently, epigenetic changes have been linked to the development and progression of disease such as psychiatric disorders. High-throughput epigenetic experiments have enabled researchers to measure genome-wide epigenetic profiles and yield data consisting of intensity ratios of immunoprecipitation versus reference samples. The intensity ratios can provide a view of genomic regions where protein binding occur under one experimental condition and further allow us to detect epigenetic alterations through comparison between two different conditions. However, such experiments can be expensive, with only a few replicates available. Moreover, epigenetic data are often spatially correlated with high noise levels. In this paper, we develop a Bayesian hierarchical model, combined with hidden Markov processes with four states for modeling spatial dependence, to detect genomic sites with epigenetic changes from two-sample experiments with paired internal control. One attractive feature of the proposed method is that the four states of the hidden Markov process have well-defined biological meanings and allow us to directly call the change patterns based on the corresponding posterior probabilities. In contrast, none of existing methods can offer this advantage. In addition, the proposed method offers great power in statistical inference by spatial smoothing (via hidden Markov modeling) and information pooling (via hierarchical modeling). Both simulation studies and real data analysis in a cocaine addiction study illustrate the reliability and success of this method. Copyright © 2012 John Wiley & Sons, Ltd.

  16. The Hidden Roles of the School Librarian

    Science.gov (United States)

    Novotny, Rebecca Maria

    2017-01-01

    Purpose: The purpose of this mixed methods study was to define the roles of school librarians as perceived by librarians and principals in regard to the ALA/AASL Standards for the Initial Preparation of School Librarians (2010). This study was designed to explore the perceptions of librarians and principals on the role of the librarian in the…

  17. World View: The Second Hidden Dimension.

    Science.gov (United States)

    Skow, Lisa; And Others

    Proposing that world view is a dimension of culture which lies below the surface of human behavior at the level of the subconscious, this paper argues that this often ignored dimension of culture profoundly influences human communication. The paper is divided into two sections. First, world view is defined and its importance in explaining how…

  18. Gauge mediation scenario with hidden sector renormalization in MSSM

    International Nuclear Information System (INIS)

    Arai, Masato; Kawai, Shinsuke; Okada, Nobuchika

    2010-01-01

    We study the hidden sector effects on the mass renormalization of a simplest gauge-mediated supersymmetry breaking scenario. We point out that possible hidden sector contributions render the soft scalar masses smaller, resulting in drastically different sparticle mass spectrum at low energy. In particular, in the 5+5 minimal gauge-mediated supersymmetry breaking with high messenger scale (that is favored by the gravitino cold dark matter scenario), we show that a stau can be the next lightest superparticle for moderate values of hidden sector self-coupling. This provides a very simple theoretical model of long-lived charged next lightest superparticles, which imply distinctive signals in ongoing and upcoming collider experiments.

  19. Gauge mediation scenario with hidden sector renormalization in MSSM

    Science.gov (United States)

    Arai, Masato; Kawai, Shinsuke; Okada, Nobuchika

    2010-02-01

    We study the hidden sector effects on the mass renormalization of a simplest gauge-mediated supersymmetry breaking scenario. We point out that possible hidden sector contributions render the soft scalar masses smaller, resulting in drastically different sparticle mass spectrum at low energy. In particular, in the 5+5¯ minimal gauge-mediated supersymmetry breaking with high messenger scale (that is favored by the gravitino cold dark matter scenario), we show that a stau can be the next lightest superparticle for moderate values of hidden sector self-coupling. This provides a very simple theoretical model of long-lived charged next lightest superparticles, which imply distinctive signals in ongoing and upcoming collider experiments.

  20. Multivariate longitudinal data analysis with mixed effects hidden Markov models.

    Science.gov (United States)

    Raffa, Jesse D; Dubin, Joel A

    2015-09-01

    Multiple longitudinal responses are often collected as a means to capture relevant features of the true outcome of interest, which is often hidden and not directly measurable. We outline an approach which models these multivariate longitudinal responses as generated from a hidden disease process. We propose a class of models which uses a hidden Markov model with separate but correlated random effects between multiple longitudinal responses. This approach was motivated by a smoking cessation clinical trial, where a bivariate longitudinal response involving both a continuous and a binomial response was collected for each participant to monitor smoking behavior. A Bayesian method using Markov chain Monte Carlo is used. Comparison of separate univariate response models to the bivariate response models was undertaken. Our methods are demonstrated on the smoking cessation clinical trial dataset, and properties of our approach are examined through extensive simulation studies. © 2015, The International Biometric Society.

  1. Applications of hidden symmetries to black hole physics

    International Nuclear Information System (INIS)

    Frolov, Valeri

    2011-01-01

    This work is a brief review of applications of hidden symmetries to black hole physics. Symmetry is one of the most important concepts of the science. In physics and mathematics the symmetry allows one to simplify a problem, and often to make it solvable. According to the Noether theorem symmetries are responsible for conservation laws. Besides evident (explicit) spacetime symmetries, responsible for conservation of energy, momentum, and angular momentum of a system, there also exist what is called hidden symmetries, which are connected with higher order in momentum integrals of motion. A remarkable fact is that black holes in four and higher dimensions always possess a set ('tower') of explicit and hidden symmetries which make the equations of motion of particles and light completely integrable. The paper gives a general review of the recently obtained results. The main focus is on understanding why at all black holes have something (symmetry) to hide.

  2. Discovering Hidden Controlling Parameters using Data Analytics and Dimensional Analysis

    Science.gov (United States)

    Del Rosario, Zachary; Lee, Minyong; Iaccarino, Gianluca

    2017-11-01

    Dimensional Analysis is a powerful tool, one which takes a priori information and produces important simplifications. However, if this a priori information - the list of relevant parameters - is missing a relevant quantity, then the conclusions from Dimensional Analysis will be incorrect. In this work, we present novel conclusions in Dimensional Analysis, which provide a means to detect this failure mode of missing or hidden parameters. These results are based on a restated form of the Buckingham Pi theorem that reveals a ridge function structure underlying all dimensionless physical laws. We leverage this structure by constructing a hypothesis test based on sufficient dimension reduction, allowing for an experimental data-driven detection of hidden parameters. Both theory and examples will be presented, using classical turbulent pipe flow as the working example. Keywords: experimental techniques, dimensional analysis, lurking variables, hidden parameters, buckingham pi, data analysis. First author supported by the NSF GRFP under Grant Number DGE-114747.

  3. Supersymmetry, p-brane duality, and hidden spacetime dimensions

    International Nuclear Information System (INIS)

    Bars, I.

    1996-01-01

    A global superalgebra with 32 supercharges and all possible central extensions is studied in order to extract some general properties of duality and hidden dimensions in a theory that treats p-branes democratically. The maximal number of dimensions is 12, with signature (10,2), containing one space and one time dimension that are hidden from the point of view of perturbative ten-dimensional string theory or its compactifications. When the theory is compactified on R d-1,1 circle-times T c+1,1 with d+c+2=12, there are isometry groups that relate to the hidden dimensions as well as to duality. Their combined intersecting classification schemes provide some properties of nonperturbative states and their couplings. copyright 1996 The American Physical Society

  4. Experimental assessment of unvalidated assumptions in classical plasticity theory.

    Energy Technology Data Exchange (ETDEWEB)

    Brannon, Rebecca Moss (University of Utah, Salt Lake City, UT); Burghardt, Jeffrey A. (University of Utah, Salt Lake City, UT); Bauer, Stephen J.; Bronowski, David R.

    2009-01-01

    This report investigates the validity of several key assumptions in classical plasticity theory regarding material response to changes in the loading direction. Three metals, two rock types, and one ceramic were subjected to non-standard loading directions, and the resulting strain response increments were displayed in Gudehus diagrams to illustrate the approximation error of classical plasticity theories. A rigorous mathematical framework for fitting classical theories to the data, thus quantifying the error, is provided. Further data analysis techniques are presented that allow testing for the effect of changes in loading direction without having to use a new sample and for inferring the yield normal and flow directions without having to measure the yield surface. Though the data are inconclusive, there is indication that classical, incrementally linear, plasticity theory may be inadequate over a certain range of loading directions. This range of loading directions also coincides with loading directions that are known to produce a physically inadmissible instability for any nonassociative plasticity model.

  5. Factor structure and concurrent validity of the world assumptions scale.

    Science.gov (United States)

    Elklit, Ask; Shevlin, Mark; Solomon, Zahava; Dekel, Rachel

    2007-06-01

    The factor structure of the World Assumptions Scale (WAS) was assessed by means of confirmatory factor analysis. The sample was comprised of 1,710 participants who had been exposed to trauma that resulted in whiplash. Four alternative models were specified and estimated using LISREL 8.72. A correlated 8-factor solution was the best explanation of the sample data. The estimates of reliability of eight subscales of the WAS ranged from .48 to .82. Scores from five subscales correlated significantly with trauma severity as measured by the Harvard Trauma Questionnaire, although the magnitude of the correlations was low to modest, ranging from .08 to -.43. It is suggested that the WAS has adequate psychometric properties for use in both clinical and research settings.

  6. Posttraumatic Growth and Shattered World Assumptions Among Ex-POWs

    DEFF Research Database (Denmark)

    Lahav, Y.; Bellin, Elisheva S.; Solomon, Z.

    2016-01-01

    Objective: The controversy regarding the nature of posttraumatic growth (PTG) includes two main competing claims: one which argues that PTG reflects authentic positive changes and the other which argues that PTG reflects illusionary defenses. The former also suggests that PTG evolves from shattered...... world assumptions (WAs) and that the co-occurrence of high PTG and negative WAs among trauma survivors reflects reconstruction of an integrative belief system. The present study aimed to test these claims by investigating, for the first time, the mediating role of dissociation in the relation between...... PTG and WAs. Method: Former prisoners of war (ex-POWs; n = 158) and comparable controls (n = 106) were assessed 38 years after the Yom Kippur War. Results: Ex-POWs endorsed more negative WAs and higher PTG and dissociation compared to controls. Ex-POWs with posttraumatic stress disorder (PTSD...

  7. Ancestral assumptions and the clinical uncertainty of evolutionary medicine.

    Science.gov (United States)

    Cournoyea, Michael

    2013-01-01

    Evolutionary medicine is an emerging field of medical studies that uses evolutionary theory to explain the ultimate causes of health and disease. Educational tools, online courses, and medical school modules are being developed to help clinicians and students reconceptualize health and illness in light of our evolutionary past. Yet clinical guidelines based on our ancient life histories are epistemically weak, relying on the controversial assumptions of adaptationism and advocating a strictly biophysical account of health. To fulfill the interventionist goals of clinical practice, it seems that proximate explanations are all we need to develop successful diagnostic and therapeutic guidelines. Considering these epistemic concerns, this article argues that the clinical relevance of evolutionary medicine remains uncertain at best.

  8. Assumptions of Customer Knowledge Enablement in the Open Innovation Process

    Directory of Open Access Journals (Sweden)

    Jokubauskienė Raminta

    2017-08-01

    Full Text Available In the scientific literature, open innovation is one of the most effective means to innovate and gain a competitive advantage. In practice, there is a variety of open innovation activities, but, nevertheless, customers stand as the cornerstone in this area, since the customers’ knowledge is one of the most important sources of new knowledge and ideas. Evaluating the context where are the interactions of open innovation and customer knowledge enablement, it is necessary to take into account the importance of customer knowledge management. Increasingly it is highlighted that customers’ knowledge management facilitates the creation of innovations. However, it should be an examination of other factors that influence the open innovation, and, at the same time, customers’ knowledge management. This article presents a theoretical model, which reveals the assumptions of open innovation process and the impact on the firm’s performance.

  9. Polarized BRDF for coatings based on three-component assumption

    Science.gov (United States)

    Liu, Hong; Zhu, Jingping; Wang, Kai; Xu, Rong

    2017-02-01

    A pBRDF(polarized bidirectional reflection distribution function) model for coatings is given based on three-component reflection assumption in order to improve the polarized scattering simulation capability for space objects. In this model, the specular reflection is given based on microfacet theory, the multiple reflection and volume scattering are given separately according to experimental results. The polarization of specular reflection is considered from Fresnel's law, and both multiple reflection and volume scattering are assumed depolarized. Simulation and measurement results of two satellite coating samples SR107 and S781 are given to validate that the pBRDF modeling accuracy can be significantly improved by the three-component model given in this paper.

  10. Halo-independent direct detection analyses without mass assumptions

    International Nuclear Information System (INIS)

    Anderson, Adam J.; Fox, Patrick J.; Kahn, Yonatan; McCullough, Matthew

    2015-01-01

    Results from direct detection experiments are typically interpreted by employing an assumption about the dark matter velocity distribution, with results presented in the m χ −σ n plane. Recently methods which are independent of the DM halo velocity distribution have been developed which present results in the v min −g-tilde plane, but these in turn require an assumption on the dark matter mass. Here we present an extension of these halo-independent methods for dark matter direct detection which does not require a fiducial choice of the dark matter mass. With a change of variables from v min to nuclear recoil momentum (p R ), the full halo-independent content of an experimental result for any dark matter mass can be condensed into a single plot as a function of a new halo integral variable, which we call h-til-tilde(p R ). The entire family of conventional halo-independent g-tilde(v min ) plots for all DM masses are directly found from the single h-tilde(p R ) plot through a simple rescaling of axes. By considering results in h-tilde(p R ) space, one can determine if two experiments are inconsistent for all masses and all physically possible halos, or for what range of dark matter masses the results are inconsistent for all halos, without the necessity of multiple g-tilde(v min ) plots for different DM masses. We conduct a sample analysis comparing the CDMS II Si events to the null results from LUX, XENON10, and SuperCDMS using our method and discuss how the results can be strengthened by imposing the physically reasonable requirement of a finite halo escape velocity

  11. Wartime Paris, cirrhosis mortality, and the ceteris paribus assumption.

    Science.gov (United States)

    Fillmore, Kaye Middleton; Roizen, Ron; Farrell, Michael; Kerr, William; Lemmens, Paul

    2002-07-01

    This article critiques the ceteris paribus assumption, which tacitly sustains the epidemiologic literature's inference that the sharp decline in cirrhosis mortality observed in Paris during the Second World War derived from a sharp constriction in wine consumption. Paris's wartime circumstances deviate substantially from the "all else being equal" assumption, and at least three other hypotheses for the cirrhosis decline may be contemplated. Historical and statistical review. Wartime Paris underwent tumultuous changes. Wine consumption did decline, but there were, as well, a myriad of other changes in diet and life experience, many involving new or heightened hardships, nutritional, experiential, institutional, health and mortality risks. Three competing hypotheses are presented: (1) A fraction of the candidates for cirrhosis mortality may have fallen to more sudden forms of death; (2) alcoholics, heavy drinkers and Paris's clochard subpopulation may have been differentially likely to become removed from the city's wartime population, whether by self-initiated departure, arrest and deportation, or death from other causes, even murder; and (3) there was mismeasurement in the cirrhosis mortality decline. The alcohol-cirrhosis connection provided the template for the alcohol research effort (now more than 20 years old) aimed at re-establishing scientific recognition of alcohol's direct alcohol-problems-generating associations and causal responsibilities. In a time given to reports of weaker associations of the alcohol-cirrhosis connection, the place and importance of the Paris curve in the wider literature, as regards that connection, remains. For this reason, the Paris findings should be subjected to as much research scrutiny as they undoubtedly deserve.

  12. Breakdown of Hydrostatic Assumption in Tidal Channel with Scour Holes

    Directory of Open Access Journals (Sweden)

    Chunyan Li

    2016-10-01

    Full Text Available Hydrostatic condition is a common assumption in tidal and subtidal motions in oceans and estuaries.. Theories with this assumption have been largely successful. However, there is no definite criteria separating the hydrostatic from the non-hydrostatic regimes in real applications because real problems often times have multiple scales. With increased refinement of high resolution numerical models encompassing smaller and smaller spatial scales, the need for non-hydrostatic models is increasing. To evaluate the vertical motion over bathymetric changes in tidal channels and assess the validity of the hydrostatic approximation, we conducted observations using a vessel-based acoustic Doppler current profiler (ADCP. Observations were made along a straight channel 18 times over two scour holes of 25 m deep, separated by 330 m, in and out of an otherwise flat 8 m deep tidal pass leading to the Lake Pontchartrain over a time period of 8 hours covering part of the diurnal tidal cycle. Out of the 18 passages over the scour holes, 11 of them showed strong upwelling and downwelling which resulted in the breakdown of hydrostatic condition. The maximum observed vertical velocity was ~ 0.35 m/s, a high value in a tidal channel, and the estimated vertical acceleration reached a high value of 1.76×10-2 m/s2. Analysis demonstrated that the barotropic non-hydrostatic acceleration was dominant. The cause of the non-hydrostatic flow was the that over steep slopes. This demonstrates that in such a system, the bathymetric variation can lead to the breakdown of hydrostatic conditions. Models with hydrostatic restrictions will not be able to correctly capture the dynamics in such a system with significant bathymetric variations particularly during strong tidal currents.

  13. QCD sum rule study of hidden-charm pentaquarks

    Energy Technology Data Exchange (ETDEWEB)

    Chen, Hua-Xing; Cui, Er-Liang [Beihang University, School of Physics and Beijing Key Laboratory of Advanced Nuclear Materials and Physics, Beijing (China); Chen, Wei; Steele, T.G. [University of Saskatchewan, Department of Physics and Engineering Physics, Saskatoon, Saskatchewan (Canada); Liu, Xiang [Lanzhou University, School of Physical Science and Technology, Lanzhou (China); Lanzhou University and Institute of Modern Physics of CAS, Research Center for Hadron and CSR Physics, Lanzhou (China); Zhu, Shi-Lin [Peking University, School of Physics and State Key Laboratory of Nuclear Physics and Technology, Beijing (China); Collaborative Innovation Center of Quantum Matter, Beijing (China); Peking University, Center of High Energy Physics, Beijing (China)

    2016-10-15

    We study the mass spectra of hidden-charm pentaquarks having spin J = (1)/(2)/(3)/(2)/(5)/(2) and quark contents uudc anti c. We systematically construct all the relevant local hidden-charm pentaquark currents, and we select some of them to perform QCD sum rule analyses. We find that the P{sub c}(4380) and P{sub c}(4450) can be identified as hidden-charm pentaquark states composed of an anti-charmed meson and a charmed baryon. Besides them, we also find (a) the lowest-lying hidden-charm pentaquark state of J{sup P} = 1/2{sup -} has the mass 4.33{sup +0.17}{sub -0.13} GeV, while the one of J{sup P} = 1/2{sup +} is significantly higher, that is, around 4.7-4.9 GeV; (b) the lowest-lying hidden-charm pentaquark state of J{sup P} = 3/2{sup -} has the mass 4.37{sup +0.18}{sub -0.13} GeV, consistent with the P{sub c}(4380) of J{sup P} = 3/2{sup -}, while the one of J{sup P} = 3/2{sup +} is also significantly higher, that is, above 4.6 GeV; (c) the hidden-charm pentaquark state of J{sup P} = 5/2{sup -} has a mass around 4.5-4.6 GeV, slightly larger than the P{sub c}(4450) of J{sup P} = 5/2{sup +}. (orig.)

  14. Definably compact groups definable in real closed fields.II

    OpenAIRE

    Barriga, Eliana

    2017-01-01

    We continue the analysis of definably compact groups definable in a real closed field $\\mathcal{R}$. In [3], we proved that for every definably compact definably connected semialgebraic group $G$ over $\\mathcal{R}$ there are a connected $R$-algebraic group $H$, a definable injective map $\\phi$ from a generic definable neighborhood of the identity of $G$ into the group $H\\left(R\\right)$ of $R$-points of $H$ such that $\\phi$ acts as a group homomorphism inside its domain. The above result and o...

  15. Assessing women's sexuality after cancer therapy: checking assumptions with the focus group technique.

    Science.gov (United States)

    Bruner, D W; Boyd, C P

    1999-12-01

    Cancer and cancer therapies impair sexual health in a multitude of ways. The promotion of sexual health is therefore vital for preserving quality of life and is an integral part of total or holistic cancer management. Nursing, to provide holistic care, requires research that is meaningful to patients as well as the profession to develop educational and interventional studies to promote sexual health and coping. To obtain meaningful research data instruments that are reliable, valid, and pertinent to patients' needs are required. Several sexual functioning instruments were reviewed for this study and found to be lacking in either a conceptual foundation or psychometric validation. Without a defined conceptual framework, authors of the instruments must have made certain assumptions regarding what women undergoing cancer therapy experience and what they perceive as important. To check these assumptions before assessing women's sexuality after cancer therapies in a larger study, a pilot study was designed to compare what women experience and perceive as important regarding their sexuality with what is assessed in several currently available research instruments, using the focus group technique. Based on the focus group findings, current sexual functioning questionnaires may be lacking in pertinent areas of concern for women treated for breast or gynecologic malignancies. Better conceptual foundations may help future questionnaire design. Self-regulation theory may provide an acceptable conceptual framework from which to develop a sexual functioning questionnaire.

  16. Bell violation using entangled photons without the fair-sampling assumption.

    Science.gov (United States)

    Giustina, Marissa; Mech, Alexandra; Ramelow, Sven; Wittmann, Bernhard; Kofler, Johannes; Beyer, Jörn; Lita, Adriana; Calkins, Brice; Gerrits, Thomas; Nam, Sae Woo; Ursin, Rupert; Zeilinger, Anton

    2013-05-09

    The violation of a Bell inequality is an experimental observation that forces the abandonment of a local realistic viewpoint--namely, one in which physical properties are (probabilistically) defined before and independently of measurement, and in which no physical influence can propagate faster than the speed of light. All such experimental violations require additional assumptions depending on their specific construction, making them vulnerable to so-called loopholes. Here we use entangled photons to violate a Bell inequality while closing the fair-sampling loophole, that is, without assuming that the sample of measured photons accurately represents the entire ensemble. To do this, we use the Eberhard form of Bell's inequality, which is not vulnerable to the fair-sampling assumption and which allows a lower collection efficiency than other forms. Technical improvements of the photon source and high-efficiency transition-edge sensors were crucial for achieving a sufficiently high collection efficiency. Our experiment makes the photon the first physical system for which each of the main loopholes has been closed, albeit in different experiments.

  17. Detecting Hidden Hierarchy of Non Hierarchical Terrorist Networks

    DEFF Research Database (Denmark)

    Memon, Nasrullah

    measures (and combinations of them) to identify key players (important nodes) in terrorist networks. Our recently introduced techniques and algorithms (which are also implemented in the investigative data mining toolkit known as iMiner) will be particularly useful for law enforcement agencies that need...... to analyze terrorist networks and prioritize their targets. Applying recently introduced mathematical methods for constructing the hidden hierarchy of "nonhierarchical" terrorist networks; we present case studies of the terrorist attacks occurred / planned in the past, in order to identify hidden hierarchy...

  18. Low-intensity interference effects and hidden-variable theories

    Energy Technology Data Exchange (ETDEWEB)

    Buonomano, V [Universidade Estadual de Campinas (Brazil). Inst. de Matematica

    1978-05-11

    The double-slit interference experiment and other similar experiments in the low-intensity limit (that is, one photon in the apparatus at a time) are examined in the spirit of Bell's work from the point of view of hidden-variable theories. It is found that there exists a class of hidden-variable theories which disagrees with quantum mechanics for a certain type of interference experiment. A manufactured conceptualization of this class, which is a particle view of interference, is described. An experiment, which appears to be feasible, is proposed to examine this disagreement.

  19. Application of Hidden Markov Models in Biomolecular Simulations.

    Science.gov (United States)

    Shukla, Saurabh; Shamsi, Zahra; Moffett, Alexander S; Selvam, Balaji; Shukla, Diwakar

    2017-01-01

    Hidden Markov models (HMMs) provide a framework to analyze large trajectories of biomolecular simulation datasets. HMMs decompose the conformational space of a biological molecule into finite number of states that interconvert among each other with certain rates. HMMs simplify long timescale trajectories for human comprehension, and allow comparison of simulations with experimental data. In this chapter, we provide an overview of building HMMs for analyzing bimolecular simulation datasets. We demonstrate the procedure for building a Hidden Markov model for Met-enkephalin peptide simulation dataset and compare the timescales of the process.

  20. Enhanced axion-photon coupling in GUT with hidden photon

    Science.gov (United States)

    Daido, Ryuji; Takahashi, Fuminobu; Yokozaki, Norimi

    2018-05-01

    We show that the axion coupling to photons can be enhanced in simple models with a single Peccei-Quinn field, if the gauge coupling unification is realized by a large kinetic mixing χ = O (0.1) between hypercharge and unbroken hidden U(1)H. The key observation is that the U(1)H gauge coupling should be rather strong to induce such large kinetic mixing, leading to enhanced contributions of hidden matter fields to the electromagnetic anomaly. We find that the axion-photon coupling is enhanced by about a factor of 10-100 with respect to the GUT-axion models with E / N = 8 / 3.

  1. Hidden Neural Networks: A Framework for HMM/NN Hybrids

    DEFF Research Database (Denmark)

    Riis, Søren Kamaric; Krogh, Anders Stærmose

    1997-01-01

    This paper presents a general framework for hybrids of hidden Markov models (HMM) and neural networks (NN). In the new framework called hidden neural networks (HNN) the usual HMM probability parameters are replaced by neural network outputs. To ensure a probabilistic interpretation the HNN is nor...... HMMs on TIMIT continuous speech recognition benchmarks. On the task of recognizing five broad phoneme classes an accuracy of 84% is obtained compared to 76% for a standard HMM. Additionally, we report a preliminary result of 69% accuracy on the TIMIT 39 phoneme task...

  2. Search for hidden Higgs decay in ATLAS detector

    International Nuclear Information System (INIS)

    Gabrielli, A.

    2013-01-01

    In this paper, a brief overview of the search for the Higgs boson in Hidden Valley models is given. Hidden Valley models predict Higgs decays to neutral particles, which can be also long lived with decay paths comparable to the LHC detectors dimensions. Decay final states consist of collimated leptons (Lepton Jets). Results are presented of a search for Higgs decays to long lived particles in the ATLAS detector at the LHC, based on 1.92 fb −1 data collected during 2011 at a 7TeV center-of-mass energy.

  3. Detecting Faults By Use Of Hidden Markov Models

    Science.gov (United States)

    Smyth, Padhraic J.

    1995-01-01

    Frequency of false alarms reduced. Faults in complicated dynamic system (e.g., antenna-aiming system, telecommunication network, or human heart) detected automatically by method of automated, continuous monitoring. Obtains time-series data by sampling multiple sensor outputs at discrete intervals of t and processes data via algorithm determining whether system in normal or faulty state. Algorithm implements, among other things, hidden first-order temporal Markov model of states of system. Mathematical model of dynamics of system not needed. Present method is "prior" method mentioned in "Improved Hidden-Markov-Model Method of Detecting Faults" (NPO-18982).

  4. Tank waste remediation system retrieval and disposal mission key enabling assumptions

    International Nuclear Information System (INIS)

    Baldwin, J.H.

    1998-01-01

    An overall systems approach has been applied to develop action plans to support the retrieval and immobilization waste disposal mission. The review concluded that the systems and infrastructure required to support the mission are known. Required systems are either in place or plans have been developed. An analysis of the programmatic, management and technical activities necessary to declare Readiness to Proceed with execution of the mission demonstrates that the system, people, and hardware will be on line and ready to support the private contractors. The systems approach included defining the retrieval and immobilized waste disposal mission requirements and evaluating the readiness of the TWRS contractor to supply waste feed to the private contractors in June 2002. The Phase 1 feed delivery requirements from the Private Contractor Request for Proposals were reviewed, transfer piping routes were mapped on it, existing systems were evaluated, and upgrade requirements were defined. Technical Basis Reviews were completed to define work scope in greater detail, cost estimates and associated year by year financial analyses were completed. Personnel training, qualifications, management systems and procedures were reviewed and shown to be in place and ready to support the Phase 1B mission. Key assumptions and risks that could negatively impact mission success were evaluated and appropriate mitigative actions plans were planned and scheduled

  5. Addressing the hidden curriculum: understanding educator professionalism.

    Science.gov (United States)

    Glicken, Anita Duhl; Merenstein, Gerald B

    2007-02-01

    Several authors agree that student observations of behaviors are a far greater influence than prescriptions for behavior offered in the classroom. While these authors stress the importance of modeling of professional relationships with patients and colleagues, at times they have fallen short of acknowledging the importance of the values inherent in the role of the professional educator. This includes relationships and concomitant behaviors that stem from the responsibilities of being an educator based on expectations of institutional and societal culture. While medical professionals share standards of medical practice in exercising medical knowledge, few have obtained formal training in the knowledge, skills and attitudes requisite for teaching excellence. Attention needs to be paid to the professionalization of medical educators as teachers, a professionalization process that parallels and often intersects the values and behaviors of medical practice but remains a distinct and important body of knowledge and skills unto itself. Enhancing educator professionalism is a critical issue in educational reform, increasing accountability for meeting student needs. Assumptions regarding educator professionalism are subject to personal and cultural interpretation, warranting additional dialogue and research as we work to expand definitions and guidelines that assess and reward educator performance.

  6. Hidden Pair of Supermassive Black Holes

    Science.gov (United States)

    Kohler, Susanna

    2015-08-01

    Could a pair of supermassive black holes (SMBHs) be lurking at the center of the galaxy Mrk 231? A recent study finds that this may be the case and the unique spectrum of this galaxy could be the key to discovering more hidden binary SMBH systems.Where Are the Binary Supermassive Black Holes?Its believed that most, if not all, galaxies have an SMBH at their centers. As two galaxies merge, the two SMBHs should evolve into a closely-bound binary system before they eventually merge. Given the abundance of galaxy mergers, we would expect to see the kinematic and visual signatures of these binary SMBHs among observed active galactic nuclei yet such evidence for sub-parsec binary SMBH systems remains scarce and ambiguous. This has led researchers to wonder: is there another way that we might detect these elusive systems?A collaboration led by Chang-Shuo Yan (National Astronomical Observatories, Chinese Academy of Sciences) thinks that there is. The group suggests that these systems might have distinct signatures in their optical-to-UV spectra, and they identify a system that might be just such a candidate: Mrk 231.A Binary CandidateProposed model of Mrk 231. Two supermassive black holes, each with their own mini-disk, orbit each other in the center of a circumbinary disk. The secondary black hole has cleared gap in the circumbinary disk as a result of its orbit around the primary black hole. [Yan et al. 2015]Mrk 231 is a galaxy with a disturbed morphology and tidal tails strong clues that it might be in the final stages of a galactic merger. In addition to these signs, Mrk 231 also has an unusual spectrum for a quasar: its continuum emission displays an unexpected drop in the near-UV band.Yan and her collaborators propose that the odd behavior of Mrk 231s spectrum can be explained if the center of the galaxy houses a pair of SMBHs each with its own mini accretion disk surrounded by a circumbinary accretion disk. As the secondary SMBH orbits the primary SMBH (with a

  7.  Basic assumptions and definitions in the analysis of financial leverage

    Directory of Open Access Journals (Sweden)

    Tomasz Berent

    2015-12-01

    Full Text Available The financial leverage literature has been in a state of terminological chaos for decades as evidenced, for example, by the Nobel Prize Lecture mistake on the one hand, and the global financial crisis on the other. A meaningful analysis of the leverage phenomenon calls for the formulation of a coherent set of assumptions and basic definitions. The objective of the paper is to answer this call. The paper defines leverage as a value neutral concept useful in explaining the magnification effect exerted by financial activity upon the whole spectrum of financial results. By adopting constructivism as a methodological approach, we are able to introduce various types of leverage such as capital and income, base and non-base, accounting and market value, for levels and for distances (absolute and relative, costs and simple etc. The new definitions formulated here are subsequently adopted in the analysis of the content of leverage statements used by the leading finance textbook.

  8. Design assumptions and bases for small D-T-fueled Sperical Tokamak (ST) fusion core

    International Nuclear Information System (INIS)

    Peng, Y.K.M.; Galambos, J.D.; Fogarty, P.J.

    1996-01-01

    Recent progress in defining the assumptions and clarifying the bases for a small D-T-fueled ST fusion core are presented. The paper covers several issues in the physics of ST plasmas, the technology of neutral beam injection, the engineering design configuration, and the center leg material under intense neutron irradiation. This progress was driven by the exciting data from pioneering ST experiments, a heightened interest in proof-of-principle experiments at the MA level in plasma current, and the initiation of the first conceptual design study of the small ST fusion core. The needs recently identified for a restructured fusion energy sciences program have provided a timely impetus for examining the subject of this paper. Our results, though preliminary in nature, strengthen the case for the potential realism and attractiveness of the ST approach

  9. Defining and Distinguishing Secular and Religious Terrorism

    Directory of Open Access Journals (Sweden)

    Heather S. Gregg

    2014-04-01

    Full Text Available Religious terrorism is typically characterised as acts of unrestrained, irrational and indiscriminant violence, thus offering few if any policy options for counterterrorism measures. This assumption about religious terrorism stems from two challenges in the literature: disproportionate attention to apocalyptic terrorism, and a lack of distinction between religious terrorism and its secular counterpart. This article, therefore, aims to do four things: define and differentiate religiously motivated terrorism from traditional terrorism; investigate three goals of religious terrorism (fomenting the apocalypse, creating a religious government, and establishing a religiously pure state; consider the role of leadership and target selection of religious terrorists; and, finally, suggest a range of counterterrorism strategies based on these observations.

  10. Hidden sources of grapefruit in beverages: potential interactions with immunosuppressant medications.

    Science.gov (United States)

    Auten, Ashley A; Beauchamp, Lauren N; Joshua Taylor; Hardinger, Karen L

    2013-06-01

    The interaction between grapefruit-containing beverages and immunosuppressants is not well defined in the literature. This study was conducted to investigate possible sources of grapefruit juice or grapefruit extract in common US-manufactured beverages. The goal was to identify those products that might serve as hidden sources of dietary grapefruit intake, increasing a transplant patient's risk for drug interactions. A careful review of the ingredients of the 3 largest US beverage manufacturer's product lines was conducted through manufacturer correspondence, product labeling examination, and online nutrition database research. Focus was placed on citrus-flavored soft drinks, teas, and juice products and their impact on a patient's immunosuppressant regimens. Twenty-three beverages were identified that contained grapefruit. Five did not contain the word "grapefruit" in the product name. In addition to the confirmed grapefruit-containing products, 17 products were identified as possibly containing grapefruit juice or grapefruit extract. A greater emphasis should be placed upon properly educating patients regarding hidden sources of grapefruit in popular US beverages and the potential for food-drug interactions.

  11. A Dynamic Hidden Forwarding Path Planning Method Based on Improved Q-Learning in SDN Environments

    Directory of Open Access Journals (Sweden)

    Yun Chen

    2018-01-01

    Full Text Available Currently, many methods are available to improve the target network’s security. The vast majority of them cannot obtain an optimal attack path and interdict it dynamically and conveniently. Almost all defense strategies aim to repair known vulnerabilities or limit services in target network to improve security of network. These methods cannot response to the attacks in real-time because sometimes they need to wait for manufacturers releasing corresponding countermeasures to repair vulnerabilities. In this paper, we propose an improved Q-learning algorithm to plan an optimal attack path directly and automatically. Based on this path, we use software-defined network (SDN to adjust routing paths and create hidden forwarding paths dynamically to filter vicious attack requests. Compared to other machine learning algorithms, Q-learning only needs to input the target state to its agents, which can avoid early complex training process. We improve Q-learning algorithm in two aspects. First, a reward function based on the weights of hosts and attack success rates of vulnerabilities is proposed, which can adapt to different network topologies precisely. Second, we remove the actions and merge them into every state that reduces complexity from O(N3 to O(N2. In experiments, after deploying hidden forwarding paths, the security of target network is boosted significantly without having to repair network vulnerabilities immediately.

  12. Hidden markov model for the prediction of transmembrane proteins using MATLAB.

    Science.gov (United States)

    Chaturvedi, Navaneet; Shanker, Sudhanshu; Singh, Vinay Kumar; Sinha, Dhiraj; Pandey, Paras Nath

    2011-01-01

    Since membranous proteins play a key role in drug targeting therefore transmembrane proteins prediction is active and challenging area of biological sciences. Location based prediction of transmembrane proteins are significant for functional annotation of protein sequences. Hidden markov model based method was widely applied for transmembrane topology prediction. Here we have presented a revised and a better understanding model than an existing one for transmembrane protein prediction. Scripting on MATLAB was built and compiled for parameter estimation of model and applied this model on amino acid sequence to know the transmembrane and its adjacent locations. Estimated model of transmembrane topology was based on TMHMM model architecture. Only 7 super states are defined in the given dataset, which were converted to 96 states on the basis of their length in sequence. Accuracy of the prediction of model was observed about 74 %, is a good enough in the area of transmembrane topology prediction. Therefore we have concluded the hidden markov model plays crucial role in transmembrane helices prediction on MATLAB platform and it could also be useful for drug discovery strategy. The database is available for free at bioinfonavneet@gmail.comvinaysingh@bhu.ac.in.

  13. The Impact of Modeling Assumptions in Galactic Chemical Evolution Models

    Science.gov (United States)

    Côté, Benoit; O'Shea, Brian W.; Ritter, Christian; Herwig, Falk; Venn, Kim A.

    2017-02-01

    We use the OMEGA galactic chemical evolution code to investigate how the assumptions used for the treatment of galactic inflows and outflows impact numerical predictions. The goal is to determine how our capacity to reproduce the chemical evolution trends of a galaxy is affected by the choice of implementation used to include those physical processes. In pursuit of this goal, we experiment with three different prescriptions for galactic inflows and outflows and use OMEGA within a Markov Chain Monte Carlo code to recover the set of input parameters that best reproduces the chemical evolution of nine elements in the dwarf spheroidal galaxy Sculptor. This provides a consistent framework for comparing the best-fit solutions generated by our different models. Despite their different degrees of intended physical realism, we found that all three prescriptions can reproduce in an almost identical way the stellar abundance trends observed in Sculptor. This result supports the similar conclusions originally claimed by Romano & Starkenburg for Sculptor. While the three models have the same capacity to fit the data, the best values recovered for the parameters controlling the number of SNe Ia and the strength of galactic outflows, are substantially different and in fact mutually exclusive from one model to another. For the purpose of understanding how a galaxy evolves, we conclude that only reproducing the evolution of a limited number of elements is insufficient and can lead to misleading conclusions. More elements or additional constraints such as the Galaxy’s star-formation efficiency and the gas fraction are needed in order to break the degeneracy between the different modeling assumptions. Our results show that the successes and failures of chemical evolution models are predominantly driven by the input stellar yields, rather than by the complexity of the Galaxy model itself. Simple models such as OMEGA are therefore sufficient to test and validate stellar yields. OMEGA

  14. Photoacoustic imaging of hidden dental caries by using a fiber-based probing system

    Science.gov (United States)

    Koyama, Takuya; Kakino, Satoko; Matsuura, Yuji

    2017-04-01

    Photoacoustic method to detect hidden dental caries is proposed. It was found that high frequency ultrasonic waves are generated from hidden carious part when radiating laser light to occlusal surface of model tooth. By making a map of intensity of these high frequency components, photoacoustic images of hidden caries were successfully obtained. A photoacoustic imaging system using a bundle of hollow optical fiber was fabricated for using clinical application, and clear photoacoustic image of hidden caries was also obtained by this system.

  15. Low-scale gravity mediation in warped extra dimension and collider phenomenology on hidden sector

    International Nuclear Information System (INIS)

    Itoh, H.; Okada, N.; Yamashita, T.

    2007-01-01

    We propose a new scenario of gravity-mediated supersymmetry breaking (gravity mediation) in a supersymmetric Randall-Sundrum model, where the gravity mediation takes place at a low scale due to the warped metric. We investigate collider phenomenology involving the hidden sector field, and find a possibility that the hidden sector field can be produced at the LHC and the ILC. The hidden sector may no longer be hidden. (author)

  16. Speakers' assumptions about the lexical flexibility of idioms.

    Science.gov (United States)

    Gibbs, R W; Nayak, N P; Bolton, J L; Keppel, M E

    1989-01-01

    In three experiments, we examined why some idioms can be lexically altered and still retain their figurative meanings (e.g., John buttoned his lips about Mary can be changed into John fastened his lips about Mary and still mean "John didn't say anything about Mary"), whereas other idioms cannot be lexically altered without losing their figurative meanings (e.g., John kicked the bucket, meaning "John died," loses its idiomatic meaning when changed into John kicked the pail). Our hypothesis was that the lexical flexibility of idioms is determined by speakers' assumptions about the ways in which parts of idioms contribute to their figurative interpretations as a whole. The results of the three experiments indicated that idioms whose individual semantic components contribute to their overall figurative meanings (e.g., go out on a limb) were judged as less disrupted by changes in their lexical items (e.g., go out on a branch) than were nondecomposable idioms (e.g., kick the bucket) when their individual words were altered (e.g., punt the pail). These findings lend support to the idea that both the syntactic productivity and the lexical makeup of idioms are matters of degree, depending on the idioms' compositional properties. This conclusion suggests that idioms do not form a unique class of linguistic items, but share many of the properties of more literal language.

  17. Weak convergence of Jacobian determinants under asymmetric assumptions

    Directory of Open Access Journals (Sweden)

    Teresa Alberico

    2012-05-01

    Full Text Available Let $\\Om$ be a bounded open set in $\\R^2$ sufficiently smooth and $f_k=(u_k,v_k$ and $f=(u,v$ mappings belong to the Sobolev space $W^{1,2}(\\Om,\\R^2$. We prove that if the sequence of Jacobians $J_{f_k}$ converges to a measure $\\mu$ in sense of measures andif one allows different assumptions on the two components of $f_k$ and $f$, e.g.$$u_k \\rightharpoonup u \\;\\;\\mbox{weakly in} \\;\\; W^{1,2}(\\Om \\qquad \\, v_k \\rightharpoonup v \\;\\;\\mbox{weakly in} \\;\\; W^{1,q}(\\Om$$for some $q\\in(1,2$, then\\begin{equation}\\label{0}d\\mu=J_f\\,dz.\\end{equation}Moreover, we show that this result is optimal in the sense that conclusion fails for $q=1$.On the other hand, we prove that \\eqref{0} remains valid also if one considers the case $q=1$, but it is necessary to require that $u_k$ weakly converges to $u$ in a Zygmund-Sobolev space with a slightly higher degree of regularity than $W^{1,2}(\\Om$ and precisely$$ u_k \\rightharpoonup u \\;\\;\\mbox{weakly in} \\;\\; W^{1,L^2 \\log^\\alpha L}(\\Om$$for some $\\alpha >1$.    

  18. Stream of consciousness: Quantum and biochemical assumptions regarding psychopathology.

    Science.gov (United States)

    Tonello, Lucio; Cocchi, Massimo; Gabrielli, Fabio; Tuszynski, Jack A

    2017-04-01

    The accepted paradigms of mainstream neuropsychiatry appear to be incompletely adequate and in various cases offer equivocal analyses. However, a growing number of new approaches are being proposed that suggest the emergence of paradigm shifts in this area. In particular, quantum theories of mind, brain and consciousness seem to offer a profound change to the current approaches. Unfortunately these quantum paradigms harbor at least two serious problems. First, they are simply models, theories, and assumptions, with no convincing experiments supporting their claims. Second, they deviate from contemporary mainstream views of psychiatric illness and do so in revolutionary ways. We suggest a possible way to integrate experimental neuroscience with quantum models in order to address outstanding issues in psychopathology. A key role is played by the phenomenon called the "stream of consciousness", which can be linked to the so-called "Gamma Synchrony" (GS), which is clearly demonstrated by EEG data. In our novel proposal, a unipolar depressed patient could be seen as a subject with an altered stream of consciousness. In particular, some clues suggest that depression is linked to an "increased power" stream of consciousness. It is additionally suggested that such an approach to depression might be extended to psychopathology in general with potential benefits to diagnostics and therapeutics in neuropsychiatry. Copyright © 2017 Elsevier Ltd. All rights reserved.

  19. Assumptions of the primordial spectrum and cosmological parameter estimation

    International Nuclear Information System (INIS)

    Shafieloo, Arman; Souradeep, Tarun

    2011-01-01

    The observables of the perturbed universe, cosmic microwave background (CMB) anisotropy and large structures depend on a set of cosmological parameters, as well as the assumed nature of primordial perturbations. In particular, the shape of the primordial power spectrum (PPS) is, at best, a well-motivated assumption. It is known that the assumed functional form of the PPS in cosmological parameter estimation can affect the best-fit-parameters and their relative confidence limits. In this paper, we demonstrate that a specific assumed form actually drives the best-fit parameters into distinct basins of likelihood in the space of cosmological parameters where the likelihood resists improvement via modifications to the PPS. The regions where considerably better likelihoods are obtained allowing free-form PPS lie outside these basins. In the absence of a preferred model of inflation, this raises a concern that current cosmological parameter estimates are strongly prejudiced by the assumed form of PPS. Our results strongly motivate approaches toward simultaneous estimation of the cosmological parameters and the shape of the primordial spectrum from upcoming cosmological data. It is equally important for theorists to keep an open mind towards early universe scenarios that produce features in the PPS. (paper)

  20. Fourth-order structural steganalysis and analysis of cover assumptions

    Science.gov (United States)

    Ker, Andrew D.

    2006-02-01

    We extend our previous work on structural steganalysis of LSB replacement in digital images, building detectors which analyse the effect of LSB operations on pixel groups as large as four. Some of the method previously applied to triplets of pixels carries over straightforwardly. However we discover new complexities in the specification of a cover image model, a key component of the detector. There are many reasonable symmetry assumptions which we can make about parity and structure in natural images, only some of which provide detection of steganography, and the challenge is to identify the symmetries a) completely, and b) concisely. We give a list of possible symmetries and then reduce them to a complete, non-redundant, and approximately independent set. Some experimental results suggest that all useful symmetries are thus described. A weighting is proposed and its approximate variance stabilisation verified empirically. Finally, we apply symmetries to create a novel quadruples detector for LSB replacement steganography. Experimental results show some improvement, in most cases, over other detectors. However the gain in performance is moderate compared with the increased complexity in the detection algorithm, and we suggest that, without new insight, further extension of structural steganalysis may provide diminishing returns.

  1. On Some Unwarranted Tacit Assumptions in Cognitive Neuroscience†

    Science.gov (United States)

    Mausfeld, Rainer

    2011-01-01

    The cognitive neurosciences are based on the idea that the level of neurons or neural networks constitutes a privileged level of analysis for the explanation of mental phenomena. This paper brings to mind several arguments to the effect that this presumption is ill-conceived and unwarranted in light of what is currently understood about the physical principles underlying mental achievements. It then scrutinizes the question why such conceptions are nevertheless currently prevailing in many areas of psychology. The paper argues that corresponding conceptions are rooted in four different aspects of our common-sense conception of mental phenomena and their explanation, which are illegitimately transferred to scientific enquiry. These four aspects pertain to the notion of explanation, to conceptions about which mental phenomena are singled out for enquiry, to an inductivist epistemology, and, in the wake of behavioristic conceptions, to a bias favoring investigations of input–output relations at the expense of enquiries into internal principles. To the extent that the cognitive neurosciences methodologically adhere to these tacit assumptions, they are prone to turn into a largely a-theoretical and data-driven endeavor while at the same time enhancing the prospects for receiving widespread public appreciation of their empirical findings. PMID:22435062

  2. On some unwarranted tacit assumptions in cognitive neuroscience.

    Science.gov (United States)

    Mausfeld, Rainer

    2012-01-01

    The cognitive neurosciences are based on the idea that the level of neurons or neural networks constitutes a privileged level of analysis for the explanation of mental phenomena. This paper brings to mind several arguments to the effect that this presumption is ill-conceived and unwarranted in light of what is currently understood about the physical principles underlying mental achievements. It then scrutinizes the question why such conceptions are nevertheless currently prevailing in many areas of psychology. The paper argues that corresponding conceptions are rooted in four different aspects of our common-sense conception of mental phenomena and their explanation, which are illegitimately transferred to scientific enquiry. These four aspects pertain to the notion of explanation, to conceptions about which mental phenomena are singled out for enquiry, to an inductivist epistemology, and, in the wake of behavioristic conceptions, to a bias favoring investigations of input-output relations at the expense of enquiries into internal principles. To the extent that the cognitive neurosciences methodologically adhere to these tacit assumptions, they are prone to turn into a largely a-theoretical and data-driven endeavor while at the same time enhancing the prospects for receiving widespread public appreciation of their empirical findings.

  3. Are waves of relational assumptions eroding traditional analysis?

    Science.gov (United States)

    Meredith-Owen, William

    2013-11-01

    The author designates as 'traditional' those elements of psychoanalytic presumption and practice that have, in the wake of Fordham's legacy, helped to inform analytical psychology and expand our capacity to integrate the shadow. It is argued that this element of the broad spectrum of Jungian practice is in danger of erosion by the underlying assumptions of the relational approach, which is fast becoming the new establishment. If the maps of the traditional landscape of symbolic reference (primal scene, Oedipus et al.) are disregarded, analysts are left with only their own self-appointed authority with which to orientate themselves. This self-centric epistemological basis of the relationalists leads to a revision of 'analytic attitude' that may be therapeutic but is not essentially analytic. This theme is linked to the perennial challenge of balancing differentiation and merger and traced back, through Chasseguet-Smirgel, to its roots in Genesis. An endeavour is made to illustrate this within the Journal convention of clinically based discussion through a commentary on Colman's (2013) avowedly relational treatment of the case material presented in his recent Journal paper 'Reflections on knowledge and experience' and through an assessment of Jessica Benjamin's (2004) relational critique of Ron Britton's (1989) transference embodied approach. © 2013, The Society of Analytical Psychology.

  4. Generalized inequalities for quantum correlations with hidden variables

    International Nuclear Information System (INIS)

    Vinduska, M.

    1991-01-01

    Renowned inequalities for quantum correlations are generalized for the case when quantum system cannot be described with an absolute independent measure of the probability. Such a formulation appears to be suitable for the formulation of the hidden variables theory in terms of non-Euclidean geometry. 10 refs

  5. Hidden conic quadratic representation of some nonconvex quadratic optimization problems

    NARCIS (Netherlands)

    Ben-Tal, A.; den Hertog, D.

    The problem of minimizing a quadratic objective function subject to one or two quadratic constraints is known to have a hidden convexity property, even when the quadratic forms are indefinite. The equivalent convex problem is a semidefinite one, and the equivalence is based on the celebrated

  6. Measurement problem and local hidden variables with entangled photons

    Directory of Open Access Journals (Sweden)

    Muchowski Eugen

    2017-12-01

    Full Text Available It is shown that there is no remote action with polarization measurements of photons in singlet state. A model is presented introducing a hidden parameter which determines the polarizer output. This model is able to explain the polarization measurement results with entangled photons. It is not ruled out by Bell’s Theorem.

  7. The incompatibility between local hidden variable theories and the ...

    Indian Academy of Sciences (India)

    I discuss in detail the result that the Bell's inequalities derived in the context of local hidden variable theories for discrete quantized observables can be satisfied only if a fundamental conservation law is violated on the average. This result shows that such theories are physically nonviable, and makes the demarcating criteria ...

  8. A novel design of hidden web crawler using ontology

    OpenAIRE

    Manvi; Bhatia, Komal Kumar; Dixit, Ashutosh

    2015-01-01

    Deep Web is content hidden behind HTML forms. Since it represents a large portion of the structured, unstructured and dynamic data on the Web, accessing Deep-Web content has been a long challenge for the database community. This paper describes a crawler for accessing Deep-Web using Ontologies. Performance evaluation of the proposed work showed that this new approach has promising results.

  9. Hidden symmetries of the Principal Chiral Model unveiled

    International Nuclear Information System (INIS)

    Devchand, C.; Schiff, J.

    1996-12-01

    By relating the two-dimensional U(N) Principal Chiral Model to a Simple linear system we obtain a free-field parametrization of solutions. Obvious symmetry transformations on the free-field data give symmetries of the model. In this way all known 'hidden symmetries' and Baecklund transformations, as well as a host of new symmetries, arise. (author). 21 refs

  10. A hidden bias in a common calorimeter calibration scheme

    International Nuclear Information System (INIS)

    Lincoln, Don; Morrow, Greg; Kasper, Peter

    1994-01-01

    In this paper, a common calorimeter calibration scheme is explored and a hidden bias found. Since this bias mimics a non-linearity in response in the calorimeter, it must be understood and removed from the calibration before true non-linearities are investigated. The effect and its removal are explored and understood through straightforward calculus and algebra. ((orig.))

  11. Exposing the Hidden-Web Induced by Ajax

    NARCIS (Netherlands)

    Mesbah, A.; Van Deursen, A.

    2008-01-01

    AJAX is a very promising approach for improving rich interactivity and responsiveness of web applications. At the same time, AJAX techniques increase the totality of the hidden web by shattering the metaphor of a web ‘page’ upon which general search engines are based. This paper describes a

  12. Crisis Entrepreneurs and Hidden Crises : Illustrative Examples of Interactional

    NARCIS (Netherlands)

    Prof. Cees van Woerkum; dr. Annette Klarenbeek

    2012-01-01

    We examine the ways in which a hidden crisis can be exposed from a communication point of view. In which way can organisations create general awareness of a crisis and try to understand the dynamic nature of interactions? With the help of discourse analysis, we have examined the interactional

  13. Hidden symmetry of the quantum Calogero-Moser system

    DEFF Research Database (Denmark)

    Kuzentsov, Vadim b

    1996-01-01

    The hidden symmetry of the quantum Calogero-Moser system with an inverse-square potential is algebraically demonstrated making use of Dunkl's operators. We find the underlying algebra explaining the super-integrability phenomenon for this system. Applications to related multi-variable Bessel...... functions are also discussed....

  14. Duality and hidden symmetries in interacting particle systems

    NARCIS (Netherlands)

    Giardinà, C.; Kurchan, J.; Redig, F.H.J.; Vafayi, K.

    2009-01-01

    In the context of Markov processes, both in discrete and continuous setting, we show a general relation between duality functions and symmetries of the generator. If the generator can be written in the form of a Hamiltonian of a quantum spin system, then the "hidden" symmetries are easily derived.

  15. A Constraint Model for Constrained Hidden Markov Models

    DEFF Research Database (Denmark)

    Christiansen, Henning; Have, Christian Theil; Lassen, Ole Torp

    2009-01-01

    A Hidden Markov Model (HMM) is a common statistical model which is widely used for analysis of biological sequence data and other sequential phenomena. In the present paper we extend HMMs with constraints and show how the familiar Viterbi algorithm can be generalized, based on constraint solving ...

  16. Is There Hidden Potential for Rural Population Growth in Sweden?

    Science.gov (United States)

    Niedomysl, Thomas; Amcoff, Jan

    2011-01-01

    Rural depopulation is a concern in many countries, and various policy initiatives have been taken to combat such trends. This article examines whether hidden potential for rural population growth can be found in Sweden. If such potential exists, it implies that the development prospects for many rural areas are not as unpromising as they may seem…

  17. Optimisation of Hidden Markov Model using Baum–Welch algorithm

    Indian Academy of Sciences (India)

    Home; Journals; Journal of Earth System Science; Volume 126; Issue 1. Optimisation of Hidden Markov Model using Baum–Welch algorithm for prediction of maximum and minimum temperature over Indian Himalaya. J C Joshi Tankeshwar Kumar Sunita Srivastava Divya Sachdeva. Volume 126 Issue 1 February 2017 ...

  18. Hidden Markov Model for quantitative prediction of snowfall

    Indian Academy of Sciences (India)

    A Hidden Markov Model (HMM) has been developed for prediction of quantitative snowfall in Pir-Panjal and Great Himalayan mountain ranges of Indian Himalaya. The model predicts snowfall for two days in advance using daily recorded nine meteorological variables of past 20 winters from 1992–2012. There are six ...

  19. Light hidden-sector U(1)s in string compactifications

    Energy Technology Data Exchange (ETDEWEB)

    Goodsell, Mark; Ringwald, Andreas

    2010-02-15

    We review the case for light U(1) gauge bosons in the hidden-sector of heterotic and type II string compactifications, present estimates of the size of their kinetic mixing with the visible-sector hypercharge U(1), and discuss their possibly very interesting phenomenological consequences in particle physics and cosmology. (orig.)

  20. Book Review: "Hidden Markov Models for Time Series: An ...

    African Journals Online (AJOL)

    Hidden Markov Models for Time Series: An Introduction using R. by Walter Zucchini and Iain L. MacDonald. Chapman & Hall (CRC Press), 2009. Full Text: EMAIL FULL TEXT EMAIL FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT · http://dx.doi.org/10.4314/saaj.v10i1.61717 · AJOL African Journals Online.

  1. TeraHertz imaging of hidden paint layers on canvas

    NARCIS (Netherlands)

    Adam, A.J.L.; Planken, P.C.M.; Meloni, S.; Dik, J.

    2009-01-01

    We show terahertz reflection images of hidden paint layers in a painting on canvas and compare the results with X-ray Radiography and Infrared Reflectography. Our terahertz measurements show strong reflections from both the canvas/paint interface and from the raw umber/lead white interface,

  2. K­MEANS CLUSTERING FOR HIDDEN MARKOV MODEL

    NARCIS (Netherlands)

    Perrone, M.P.; Connell, S.D.

    2004-01-01

    An unsupervised k­means clustering algorithm for hidden Markov models is described and applied to the task of generating subclass models for individual handwritten character classes. The algorithm is compared to a related clustering method and shown to give a relative change in the error rate of as

  3. EVALUASI HIDDEN CURRICULUM DI SMP NEGERI BOJA, KABUPATEN KENDAL

    Directory of Open Access Journals (Sweden)

    Neni Lestari

    2015-12-01

    Full Text Available This study aimed to evaluate the implementation and impact of Hidden Curriculum, as well as the determinant factors of success and sustainability in SMPN 2 Boja Kendal. This study was an evaluative research using qualitative approach. The data collected by using observation, interviews, and documentation. Data analyzed by collecting and selecting to be deduce. Validity used triangulation data that combined the result of observation, interviews, and documentation. The results of the study were: 1 The activities of hidden curriculum development at SMPN 2 Boja Kendal, namely: flag ceremony, school environmental management, establishing and enforcing discipline, special religious worship, smiles, greetings and courtesies, exemplary, relationship among students and principal, teachers, and staff, school canteen services. 2 The impact of the hidden curriculum development was the changing of school community’s behavior being better, created clean and beautiful school environment, the improvement of public trust to the school toward their kids’ education. Development of the hidden curriculum could establish students good character and an optimal achievement as well as a good school culture. 3 Internal supporting factors including: qualified human resources, the availability of school facilities, school environment was clean and beautiful. External supporting factors occur in the form of endorsement of the parents, school committees and communities in establishing good and virtuous character for the students.

  4. Hidden and generalized conformal symmetry of Kerr–Sen spacetimes

    International Nuclear Information System (INIS)

    Ghezelbash, A M; Siahaan, H M

    2013-01-01

    It is recently conjectured that generic non-extremal Kerr black hole could be holographically dual to a hidden conformal field theory (CFT) in two dimensions. Moreover, it is known that there are two CFT duals (pictures) to describe the charged rotating black holes which correspond to angular momentum J and electric charge Q of the black hole. Furthermore these two pictures can be incorporated by the CFT duals (general picture) that are generated by SL(2,Z) modular group. The general conformal structure can be revealed by looking at charged scalar wave equation in some appropriate values of frequency and charge. In this regard, we consider the wave equation of a charged massless scalar field in the background of Kerr–Sen black hole and show that in the ‘near region’, the wave equation can be reproduced by the Casimir operator of a local SL(2,R) L ×SL(2,R) R hidden conformal symmetry. We find the exact agreement between macroscopic and microscopic physical quantities like entropy and absorption cross section of scalars for Kerr–Sen black hole. We then find an extension of vector fields that in turn yields an extended local family of SL(2,R) L ×SL(2,R) R hidden conformal symmetry, parameterized by one parameter. For some special values of the parameter, we find a copy of SL(2,R) hidden conformal algebra for the charged Gibbons–Maeda–Garfinkle–Horowitz–Strominger black hole in the strong deflection limit. (paper)

  5. Light hidden-sector U(1)s in string compactifications

    International Nuclear Information System (INIS)

    Goodsell, Mark; Ringwald, Andreas

    2010-02-01

    We review the case for light U(1) gauge bosons in the hidden-sector of heterotic and type II string compactifications, present estimates of the size of their kinetic mixing with the visible-sector hypercharge U(1), and discuss their possibly very interesting phenomenological consequences in particle physics and cosmology. (orig.)

  6. Securing Localization With Hidden and Mobile Base Stations

    DEFF Research Database (Denmark)

    Capkun, Srdjan; Srivastava, Mani; Cagalj, Mario

    2006-01-01

    localization based on hidden and mobile base stations. Our approach enables secure localization with a broad spectrum of localization techniques: ultrasonic or radio, based on received signal strength or signal time of flight. Through several examples we show how this approach can be used to secure nodecentric...

  7. Optimal Number of States in Hidden Markov Models and its ...

    African Journals Online (AJOL)

    In this paper, Hidden Markov Model is applied to model human movements as to facilitate an automatic detection of the same. A number of activities were simulated with the help of two persons. The four movements considered are walking, sitting down-getting up, fall while walking and fall while standing. The data is ...

  8. Book review: Troubling possibility, hidden fires and secret drawers ...

    African Journals Online (AJOL)

    Book review: Troubling possibility, hidden fires and secret drawers: Tiyambe Zeleza's smouldering charcoal. H.F. Ross. Abstract. No Abstract. Full Text: EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT · AJOL African Journals Online. HOW TO USE AJOL.

  9. Charm and Hidden Charm Scalar Resonances in Nuclear Matter

    NARCIS (Netherlands)

    Tolos, Laura; Molina, Raquel; Gamermann, Daniel; Oset, Eulogio

    2009-01-01

    We study the properties of the scalar charm resonances D(s0)(2317) and D(0)(2400), and the theoretical hidden charm state X(3700) in nuclear matter. We find that for the D(s0)(2317) and X(3700) resonances, with negligible and small width at zero density, respectively, the width becomes about 100 MeV

  10. Hidden Markov model for improved ultrasound-based presence detection

    NARCIS (Netherlands)

    Jaramillo Garcia, P.A.; Linnartz, J.P.M.G.

    2015-01-01

    Adaptive lighting systems typically use a presence detector to save energy by switching off lights in unoccupied rooms. However, it is highly annoying when lights are erroneously turned off while a user is present (false negative, FN). This paper focuses on the estimation of presence, using a Hidden

  11. Job Clubs: Getting into the Hidden Labor Market.

    Science.gov (United States)

    Kimeldorf, Martin; Tornow, Janice A.

    1984-01-01

    A job club approach for secondary disabled youth focuses on mastering job seeking skills by behaviorally sequenced steps learned in situational experiences within a self-help group process framework. Students learn to penetrate the hidden job market, to use social networking via the telephone, and to participate successfully in job interviews. (CL)

  12. Unpacking the Hidden Efficacies of Learning in Productive Failure

    Science.gov (United States)

    Hung, David; Chen, Victor; Lim, Seo Hong

    2009-01-01

    This paper describes a framework for learning where learners undergo experimentations with the phenomena at hand according to progressive and staged goals. Bowling is used as a case study in this paper. The premise for experimentations is that learners can experience hidden efficacies, including the formation of "bad habits." A distinction is made…

  13. Thermoelectric generator hidden in a shirt with a fabric radiator

    NARCIS (Netherlands)

    Leonov, V.; Vullers, R.J.M.; Hoof, C.V.

    2012-01-01

    Integration of thermopiles in garments has been performed in this work in different ways. It is shown that textile has a minor effect on power generation, which enables completely hidden and unobtrusive energy harvester. A one-milliwatt thermoelectric generator is then integrated between two layers

  14. B-graph sampling to estimate the size of a hidden population

    NARCIS (Netherlands)

    Spreen, M.; Bogaerts, S.

    2015-01-01

    Link-tracing designs are often used to estimate the size of hidden populations by utilizing the relational links between their members. A major problem in studies of hidden populations is the lack of a convenient sampling frame. The most frequently applied design in studies of hidden populations is

  15. Empathy in nursing. Assumptions, practice and its empirical determinants

    Directory of Open Access Journals (Sweden)

    Zarzycka Danuta

    2016-09-01

    Full Text Available Introduction. In the subject literature there were five conceptual dimensions of empathy defined which were specified as a human trait, the basis of professional work, communication process, a manifestation of concern and the special relations. Empathy is the essence of understanding the other person in nursing. The empathic competences have a significant meaning for building caring and therapeutic relations in the work of nurses.

  16. When real life wind speed exceeds design wind assumptions

    Energy Technology Data Exchange (ETDEWEB)

    Winther-Jensen, M; Joergensen, E R [Risoe National Lab., Roskilde (Denmark)

    1999-03-01

    Most modern wind turbines are designed according to a standard or a set of standards to withstand the design loads with a defined survival probability. Mainly the loads are given by the wind conditions on the site defining the `design wind speeds`, normally including extreme wind speeds given as an average and a peak value. The extreme wind speeds are normally (e.g. in the upcoming IEC standard for wind turbine safety) defined as having a 50-year recurrence period. But what happens when the 100 or 10,000 year wind situation hits a wind turbine? Results on wind turbines of wind speeds higher than the extreme design wind speeds are presented based on experiences especially from the State of Gujarat in India. A description of the normal approach of designing wind turbines in accordance with the standards in briefly given in this paper with special focus on limitations and built-in safety levels. Based on that, other possibilities than just accepting damages on wind turbines exposed for higher than design wind speeds are mentioned and discussed. The presentation does not intend to give the final answer to this problem but is meant as an input to further investigations and discussions. (au)

  17. Baryon states with hidden charm in the extended local hidden gauge approach

    International Nuclear Information System (INIS)

    Uchino, T.; Oset, E.; Liang, Wei-Hong

    2016-01-01

    The s-wave interaction of anti DΛ c , anti DΣ c , anti D * Λ c , anti D * Σ c and anti DΣ c * , anti D * Σ c * , is studied within a unitary coupled channels scheme with the extended local hidden gauge approach. In addition to the Weinberg-Tomozawa term, several additional diagrams via the pion exchange are also taken into account as box potentials. Furthermore, in order to implement the full coupled channels calculation, some of the box potentials which mix the vector-baryon and pseudoscalar-baryon sectors are extended to construct the effective transition potentials. As a result, we have observed six possible states in several angular momenta. Four of them correspond to two pairs of admixture states, two of anti DΣ c - anti D * Σ c with J = 1/2, and two of anti DΣ c * - anti D * Σ c * with J = 3/2. Moreover, we find a anti D * Σ c resonance which couples to the anti DΛ c channel and one spin degenerated bound state of anti D * Σ c * with J = 1/2,5/2. (orig.)

  18. Baryon states with hidden charm in the extended local hidden gauge approach

    Energy Technology Data Exchange (ETDEWEB)

    Uchino, T.; Oset, E. [Centro Mixto Universidad de Valencia-CSIC, Institutos de Investigacion de Paterna, Departamento de Fisica Teorica y IFIC, Valencia (Spain); Liang, Wei-Hong [Guangxi Normal University, Department of Physics, Guilin (China)

    2016-03-15

    The s-wave interaction of anti DΛ{sub c}, anti DΣ{sub c}, anti D{sup *}Λ{sub c}, anti D{sup *}Σ{sub c} and anti DΣ{sub c}{sup *}, anti D{sup *}Σ{sub c}{sup *}, is studied within a unitary coupled channels scheme with the extended local hidden gauge approach. In addition to the Weinberg-Tomozawa term, several additional diagrams via the pion exchange are also taken into account as box potentials. Furthermore, in order to implement the full coupled channels calculation, some of the box potentials which mix the vector-baryon and pseudoscalar-baryon sectors are extended to construct the effective transition potentials. As a result, we have observed six possible states in several angular momenta. Four of them correspond to two pairs of admixture states, two of anti DΣ{sub c} - anti D{sup *}Σ{sub c} with J = 1/2, and two of anti DΣ{sub c}{sup *} - anti D{sup *}Σ{sub c}{sup *} with J = 3/2. Moreover, we find a anti D{sup *}Σ{sub c} resonance which couples to the anti DΛ{sub c} channel and one spin degenerated bound state of anti D{sup *}Σ{sub c}{sup *} with J = 1/2,5/2. (orig.)

  19. Providing security assurance in line with national DBT assumptions

    Science.gov (United States)

    Bajramovic, Edita; Gupta, Deeksha

    2017-01-01

    As worldwide energy requirements are increasing simultaneously with climate change and energy security considerations, States are thinking about building nuclear power to fulfill their electricity requirements and decrease their dependence on carbon fuels. New nuclear power plants (NPPs) must have comprehensive cybersecurity measures integrated into their design, structure, and processes. In the absence of effective cybersecurity measures, the impact of nuclear security incidents can be severe. Some of the current nuclear facilities were not specifically designed and constructed to deal with the new threats, including targeted cyberattacks. Thus, newcomer countries must consider the Design Basis Threat (DBT) as one of the security fundamentals during design of physical and cyber protection systems of nuclear facilities. IAEA NSS 10 describes the DBT as "comprehensive description of the motivation, intentions and capabilities of potential adversaries against which protection systems are designed and evaluated". Nowadays, many threat actors, including hacktivists, insider threat, cyber criminals, state and non-state groups (terrorists) pose security risks to nuclear facilities. Threat assumptions are made on a national level. Consequently, threat assessment closely affects the design structures of nuclear facilities. Some of the recent security incidents e.g. Stuxnet worm (Advanced Persistent Threat) and theft of sensitive information in South Korea Nuclear Power Plant (Insider Threat) have shown that these attacks should be considered as the top threat to nuclear facilities. Therefore, the cybersecurity context is essential for secure and safe use of nuclear power. In addition, States should include multiple DBT scenarios in order to protect various target materials, types of facilities, and adversary objectives. Development of a comprehensive DBT is a precondition for the establishment and further improvement of domestic state nuclear-related regulations in the

  20. Uniform background assumption produces misleading lung EIT images.

    Science.gov (United States)

    Grychtol, Bartłomiej; Adler, Andy

    2013-06-01

    Electrical impedance tomography (EIT) estimates an image of conductivity change within a body from stimulation and measurement at body surface electrodes. There is significant interest in EIT for imaging the thorax, as a monitoring tool for lung ventilation. To be useful in this application, we require an understanding of if and when EIT images can produce inaccurate images. In this paper, we study the consequences of the homogeneous background assumption, frequently made in linear image reconstruction, which introduces a mismatch between the reference measurement and the linearization point. We show in simulation and experimental data that the resulting images may contain large and clinically significant errors. A 3D finite element model of thorax conductivity is used to simulate EIT measurements for different heart and lung conductivity, size and position, as well as different amounts of gravitational collapse and ventilation-associated conductivity change. Three common linear EIT reconstruction algorithms are studied. We find that the asymmetric position of the heart can cause EIT images of ventilation to show up to 60% undue bias towards the left lung and that the effect is particularly strong for a ventilation distribution typical of mechanically ventilated patients. The conductivity gradient associated with gravitational lung collapse causes conductivity changes in non-dependent lung to be overestimated by up to 100% with respect to the dependent lung. Eliminating the mismatch by using a realistic conductivity distribution in the forward model of the reconstruction algorithm strongly reduces these undesirable effects. We conclude that subject-specific anatomically accurate forward models should be used in lung EIT and extra care is required when analysing EIT images of subjects whose background conductivity distribution in the lungs is known to be heterogeneous or exhibiting large changes.

  1. Uniform background assumption produces misleading lung EIT images

    International Nuclear Information System (INIS)

    Grychtol, Bartłomiej; Adler, Andy

    2013-01-01

    Electrical impedance tomography (EIT) estimates an image of conductivity change within a body from stimulation and measurement at body surface electrodes. There is significant interest in EIT for imaging the thorax, as a monitoring tool for lung ventilation. To be useful in this application, we require an understanding of if and when EIT images can produce inaccurate images. In this paper, we study the consequences of the homogeneous background assumption, frequently made in linear image reconstruction, which introduces a mismatch between the reference measurement and the linearization point. We show in simulation and experimental data that the resulting images may contain large and clinically significant errors. A 3D finite element model of thorax conductivity is used to simulate EIT measurements for different heart and lung conductivity, size and position, as well as different amounts of gravitational collapse and ventilation-associated conductivity change. Three common linear EIT reconstruction algorithms are studied. We find that the asymmetric position of the heart can cause EIT images of ventilation to show up to 60% undue bias towards the left lung and that the effect is particularly strong for a ventilation distribution typical of mechanically ventilated patients. The conductivity gradient associated with gravitational lung collapse causes conductivity changes in non-dependent lung to be overestimated by up to 100% with respect to the dependent lung. Eliminating the mismatch by using a realistic conductivity distribution in the forward model of the reconstruction algorithm strongly reduces these undesirable effects. We conclude that subject-specific anatomically accurate forward models should be used in lung EIT and extra care is required when analysing EIT images of subjects whose background conductivity distribution in the lungs is known to be heterogeneous or exhibiting large changes. (paper)

  2. The Missing Books of Magic from Sandvik: In search for hidden books and secret knowledge

    Directory of Open Access Journals (Sweden)

    Åsa Ljungström

    2014-05-01

    Full Text Available This article aims at defining a privately-owned manuscript from the end of the eighteenth century; a notebook of charms, recipes and ritual prescriptions, presumed to be connected with known manuscripts of magic, that were kept secret and hidden away. The study attempts to reconstruct the context of ‘The Sandvik Notebook’, in order to find out who penned it, when, and why. What kind of knowledge was sought: was it collected for antiquarian reasons, for esoteric interest, or for practical use – such as curing livestock and human beings? Was it copied from books or collected from peasant informants, and could it be related to the extant manuscripts ‘The Black Book’ and ‘The Red Book’, objects of the same line of enquiry? The three manuscripts are from Sandvik Manor, of the joint parish Burseryd-Sandvik, Sweden.

  3. A Method for Driving Route Predictions Based on Hidden Markov Model

    Directory of Open Access Journals (Sweden)

    Ning Ye

    2015-01-01

    Full Text Available We present a driving route prediction method that is based on Hidden Markov Model (HMM. This method can accurately predict a vehicle’s entire route as early in a trip’s lifetime as possible without inputting origins and destinations beforehand. Firstly, we propose the route recommendation system architecture, where route predictions play important role in the system. Secondly, we define a road network model, normalize each of driving routes in the rectangular coordinate system, and build the HMM to make preparation for route predictions using a method of training set extension based on K-means++ and the add-one (Laplace smoothing technique. Thirdly, we present the route prediction algorithm. Finally, the experimental results of the effectiveness of the route predictions that is based on HMM are shown.

  4. Evaluation of Cloud Computing Hidden Benefits by Using Real Options Analysis

    Directory of Open Access Journals (Sweden)

    Pavel Náplava

    2016-12-01

    Full Text Available Cloud computing technologies have brought new attributes to the IT world. One of them is a flexibility of IT resources. It enables effectively both to downsize and upsize the capacity of IT resources in real time. Requirements for IT size change defines business strategy and actual market state. IT costs are not stable but dynamic in this case. Standard investment valuation methods (both static and dynamic are not able to include the flexibility attribute to the evaluation of IT projects. This article describes the application of the Real Options Analysis method for the valuation of the cloud computing flexibility. The method compares costs of the on-premise and cloud computing solutions by combining put and call option valuation. Cloud computing providers can use the method as an advanced tool that explains hidden benefits of cloud computing. Unexperienced cloud computing customers can simulate the market behavior and better plan necessary IT investments.

  5. Hidden symmetries of integrable conformal mechanical systems

    International Nuclear Information System (INIS)

    Hakobyan, Tigran; Krivonos, Sergey; Lechtenfeld, Olaf; Nersessian, Armen

    2010-01-01

    We split the generic conformal mechanical system into a 'radial' and an 'angular' part, where the latter is defined as the Hamiltonian system on the orbit of the conformal group, with the Casimir function in the role of the Hamiltonian. We reduce the analysis of the constants of motion of the full system to the study of certain differential equations on this orbit. For integrable mechanical systems, the conformal invariance renders them superintegrable, yielding an additional series of conserved quantities originally found by Wojciechowski in the rational Calogero model. Finally, we show that, starting from any N=4 supersymmetric 'angular' Hamiltonian system one may construct a new system with full N=4 superconformal D(1,2;α) symmetry.

  6. Hidden photons in beam dump experiments and in connection with dark matter

    Energy Technology Data Exchange (ETDEWEB)

    Andreas, Sarah

    2012-12-15

    Hidden sectors with light extra U(1) gauge bosons, so-called hidden photons, recently received much interest as natural feature of beyond standard model scenarios like string theory and SUSY and because of their possible connection to dark matter. This paper presents limits on hidden photons from past electron beam dump experiments including two new limits from experiments at KEK and Orsay. Additionally, various hidden sector models containing both a hidden photon and a dark matter candidate are discussed with respect to their viability and potential signatures in direct detection.

  7. Hidden photons in beam dump experiments and in connection with dark matter

    International Nuclear Information System (INIS)

    Andreas, Sarah

    2012-12-01

    Hidden sectors with light extra U(1) gauge bosons, so-called hidden photons, recently received much interest as natural feature of beyond standard model scenarios like string theory and SUSY and because of their possible connection to dark matter. This paper presents limits on hidden photons from past electron beam dump experiments including two new limits from experiments at KEK and Orsay. Additionally, various hidden sector models containing both a hidden photon and a dark matter candidate are discussed with respect to their viability and potential signatures in direct detection.

  8. Comment on ‘Information hidden in the velocity distribution of ions and the exact kinetic Bohm criterion’

    Science.gov (United States)

    Mustafaev, A. S.; Sukhomlinov, V. S.; Timofeev, N. A.

    2018-03-01

    This Comment is devoted to some mathematical inaccuracies made by the authors of the paper ‘Information hidden in the velocity distribution of ions and the exact kinetic Bohm criterion’ (Plasma Sources Science and Technology 26 055003). In the Comment, we show that the diapason of plasma parameters for the validity of the theoretical results obtained by the authors was defined incorrectly; we made a more accurate definition of this diapason. As a result, we show that it is impossible to confirm or refute the feasibility of the Bohm kinetic criterion on the basis of the data of the cited paper.

  9. Optimization of the Actuarial Model of Defined Contribution Pension Plan

    Directory of Open Access Journals (Sweden)

    Yan Li

    2014-01-01

    Full Text Available The paper focuses on the actuarial models of defined contribution pension plan. Through assumptions and calculations, the expected replacement ratios of three different defined contribution pension plans are compared. Specially, more significant considerable factors are put forward in the further cost and risk analyses. In order to get an assessment of current status, the paper finds a relationship between the replacement ratio and the pension investment rate using econometrics method. Based on an appropriate investment rate of 6%, an expected replacement ratio of 20% is reached.

  10. School Principals' Assumptions about Human Nature: Implications for Leadership in Turkey

    Science.gov (United States)

    Sabanci, Ali

    2008-01-01

    This article considers principals' assumptions about human nature in Turkey and the relationship between the assumptions held and the leadership style adopted in schools. The findings show that school principals hold Y-type assumptions and prefer a relationship-oriented style in their relations with assistant principals. However, both principals…

  11. Challenging Assumptions of International Public Relations: When Government Is the Most Important Public.

    Science.gov (United States)

    Taylor, Maureen; Kent, Michael L.

    1999-01-01

    Explores assumptions underlying Malaysia's and the United States' public-relations practice. Finds many assumptions guiding Western theories and practices are not applicable to other countries. Examines the assumption that the practice of public relations targets a variety of key organizational publics. Advances international public-relations…

  12. Educational Technology as a Subversive Activity: Questioning Assumptions Related to Teaching and Leading with Technology

    Science.gov (United States)

    Kruger-Ross, Matthew J.; Holcomb, Lori B.

    2012-01-01

    The use of educational technologies is grounded in the assumptions of teachers, learners, and administrators. Assumptions are choices that structure our understandings and help us make meaning. Current advances in Web 2.0 and social media technologies challenge our assumptions about teaching and learning. The intersection of technology and…

  13. Sensitivity of Earthquake Loss Estimates to Source Modeling Assumptions and Uncertainty

    Science.gov (United States)

    Reasenberg, Paul A.; Shostak, Nan; Terwilliger, Sharon

    2006-01-01

    Introduction: This report explores how uncertainty in an earthquake source model may affect estimates of earthquake economic loss. Specifically, it focuses on the earthquake source model for the San Francisco Bay region (SFBR) created by the Working Group on California Earthquake Probabilities. The loss calculations are made using HAZUS-MH, a publicly available computer program developed by the Federal Emergency Management Agency (FEMA) for calculating future losses from earthquakes, floods and hurricanes within the United States. The database built into HAZUS-MH includes a detailed building inventory, population data, data on transportation corridors, bridges, utility lifelines, etc. Earthquake hazard in the loss calculations is based upon expected (median value) ground motion maps called ShakeMaps calculated for the scenario earthquake sources defined in WGCEP. The study considers the effect of relaxing certain assumptions in the WG02 model, and explores the effect of hypothetical reductions in epistemic uncertainty in parts of the model. For example, it addresses questions such as what would happen to the calculated loss distribution if the uncertainty in slip rate in the WG02 model were reduced (say, by obtaining additional geologic data)? What would happen if the geometry or amount of aseismic slip (creep) on the region's faults were better known? And what would be the effect on the calculated loss distribution if the time-dependent earthquake probability were better constrained, either by eliminating certain probability models or by better constraining the inherent randomness in earthquake recurrence? The study does not consider the effect of reducing uncertainty in the hazard introduced through models of attenuation and local site characteristics, although these may have a comparable or greater effect than does source-related uncertainty. Nor does it consider sources of uncertainty in the building inventory, building fragility curves, and other assumptions

  14. Local hidden variable modelling, classicality, quantum separability and the original Bell inequality

    International Nuclear Information System (INIS)

    Loubenets, Elena R

    2011-01-01

    We introduce a general condition sufficient for the validity of the original Bell inequality (1964) in a local hidden variable (LHV) frame. This condition can be checked experimentally and incorporates only as a particular case the assumption on perfect correlations or anticorrelations usually argued for this inequality in the literature. Specifying this general condition for a quantum bipartite case, we introduce the whole class of bipartite quantum states, separable and nonseparable, that (i) admit an LHV description under any bipartite measurements with two settings per site; (ii) do not necessarily exhibit perfect correlations and may even have a negative correlation function if the same quantum observable is measured at both sites, but (iii) satisfy the 'perfect correlation' version of the original Bell inequality for any three bounded quantum observables A 1 , A 2 = B 1 , B 2 at sites 'A' and 'B', respectively. Analysing the validity of this general LHV condition under classical and quantum correlation scenarios with the same physical context, we stress that, unlike the Clauser-Horne-Shimony-Holt inequality, the original Bell inequality distinguishes between classicality and quantum separability.

  15. Adaptive hidden Markov model with anomaly States for price manipulation detection.

    Science.gov (United States)

    Cao, Yi; Li, Yuhua; Coleman, Sonya; Belatreche, Ammar; McGinnity, Thomas Martin

    2015-02-01

    Price manipulation refers to the activities of those traders who use carefully designed trading behaviors to manually push up or down the underlying equity prices for making profits. With increasing volumes and frequency of trading, price manipulation can be extremely damaging to the proper functioning and integrity of capital markets. The existing literature focuses on either empirical studies of market abuse cases or analysis of particular manipulation types based on certain assumptions. Effective approaches for analyzing and detecting price manipulation in real time are yet to be developed. This paper proposes a novel approach, called adaptive hidden Markov model with anomaly states (AHMMAS) for modeling and detecting price manipulation activities. Together with wavelet transformations and gradients as the feature extraction methods, the AHMMAS model caters to price manipulation detection and basic manipulation type recognition. The evaluation experiments conducted on seven stock tick data from NASDAQ and the London Stock Exchange and 10 simulated stock prices by stochastic differential equation show that the proposed AHMMAS model can effectively detect price manipulation patterns and outperforms the selected benchmark models.

  16. Tank waste remediation system retrieval and disposal mission key enabling assumptions

    International Nuclear Information System (INIS)

    Baldwin, J.H.

    1998-01-01

    An overall systems approach has been applied to develop action plans to support the retrieval and immobilization waste disposal mission. The review concluded that the systems and infrastructure required to support the mission are known. Required systems are either in place or plans have been developed to ensure they exist when needed. The review showed that since October 1996 a robust system engineering approach to establishing integrated Technical Baselines, work breakdown structures, tank farm structure and configurations and work scope and costs has been established itself as part of the culture within TWRS. An analysis of the programmatic, management and technical activities necessary to declare readiness to proceed with execution of the mission demonstrates that the system, people and hardware will be on line and ready to support the private contractors. The systems approach included defining the retrieval and immobilized waste disposal mission requirements and evaluating the readiness of the TWRS contractor to supply waste feed to the private contractors in June 2OO2. The Phase 1 feed delivery requirements from the Private Contractor Request for Proposals were reviewed. Transfer piping routes were mapped out, existing systems were evaluated, and upgrade requirements were defined. Technical Basis Reviews were completed to define work scope in greater detail, cost estimates and associated year by year financial analyses were completed. TWRS personnel training, qualifications, management systems and procedures were reviewed and shown to be in place and ready to support the Phase 1B mission. Key assumptions and risks that could negatively impact mission success were evaluated and appropriate mitigative actions plans were planned and scheduled

  17. The hidden traps in decision making.

    Science.gov (United States)

    Hammond, J S; Keeney, R L; Raiffa, H

    1998-01-01

    Bad decisions can often be traced back to the way the decisions were made--the alternatives were not clearly defined, the right information was not collected, the costs and benefits were not accurately weighted. But sometimes the fault lies not in the decision-making process but rather in the mind of the decision maker. The way the human brain works can sabotage the choices we make. John Hammond, Ralph Keeney, and Howard Raiffa examine eight psychological traps that are particularly likely to affect the way we make business decisions: The anchoring trap leads us to give disproportionate weight to the first information we receive. The statusquo trap biases us toward maintaining the current situation--even when better alternatives exist. The sunk-cost trap inclines us to perpetuate the mistakes of the past. The confirming-evidence trap leads us to seek out information supporting an existing predilection and to discount opposing information. The framing trap occurs when we misstate a problem, undermining the entire decision-making process. The overconfidence trap makes us overestimate the accuracy of our forecasts. The prudence trap leads us to be overcautious when we make estimates about uncertain events. And the recallability trap leads us to give undue weight to recent, dramatic events. The best way to avoid all the traps is awareness--forewarned is forearmed. But executives can also take other simple steps to protect themselves and their organizations from the various kinds of mental lapses. The authors show how to take action to ensure that important business decisions are sound and reliable.

  18. The case of the hidden harassment.

    Science.gov (United States)

    Niven, D; Wang, C; Rowe, M P; Taga, M; Vladeck, J P; Garron, L C

    1992-01-01

    The past year has seen a growing public awareness of sexual harassment in the workplace. The question of what constitutes sexual harassment and how to recognize it has been debated in the news, the courts, and Congress. This HBR case study is less concerned with defining it than with examining what a manager should do about it. When Filmore Trust manager Jerry Tarkwell found out one of his employees was being sexually harassed on the job, he thought he knew exactly what to do. Following company policy, he immediately notified the bank's equal employment office. Then he called Jill McNair, the employee being harassed. Her response dumbfounded him. "You had no right to call EEO before talking to me," McNair said angrily. Do you have any idea what could happen to me and to my career if people find out about this?" Tarkwell didn't understand; McNair wasn't to blame. He believed the only person who should be worried was the harasser. Tarkwell tried to spell out the procedure for her. "All you have to do is write a letter and ..." McNair cut him off. "If this gets investigated by EEO, everyone in the building could be questioned. I'll probably get transferred, and then I won't have a chance at promotion. And who'd want to work with me? Every man in the company would be afraid I'd report him if he so much as opened a door for me."(ABSTRACT TRUNCATED AT 250 WORDS)

  19. Heavy superpartners with less tuning from hidden sector renormalisation

    International Nuclear Information System (INIS)

    Hardy, Edward

    2014-01-01

    In supersymmetric extensions of the Standard Model, superpartner masses consistent with collider bounds typically introduce significant tuning of the electroweak scale. We show that hidden sector renormalisation can greatly reduce such a tuning if the supersymmetry breaking, or mediating, sector runs through a region of strong coupling not far from the weak scale. In the simplest models, only the tuning due to the gaugino masses is improved, and a weak scale gluino mass in the region of 5 TeV may be obtained with an associated tuning of only one part in ten. In models with more complex couplings between the visible and hidden sectors, the tuning with respect to sfermions can also be reduced. We give an example of a model, with low scale gauge mediation and superpartner masses allowed by current LHC bounds, that has an overall tuning of one part in twenty

  20. Hidden order and disorder effects in URu2Si2

    Science.gov (United States)

    Bernal, O. O.; Moroz, M. E.; Ishida, K.; Murakawa, H.; Reyes, A. P.; Kuhns, P. L.; MacLaughlin, D. E.; Mydosh, J. A.; Gortenmulder, T. J.

    2006-05-01

    NMR experiments at ambient pressure in URu 2Si 2 demonstrate a linewidth enhancement effect below the hidden order transition temperature T0. We present single-crystal 29Si NMR parameters for various temperatures and for an applied magnetic field perpendicular to the crystal c-axis. By comparing oriented-powder and single-crystal data, we observe that the size of the linewidth enhancement below T0 correlates with the size of the high- T broadening. We measure a 29Si up-field line shift below T0 which indicates the presence of an internal-field average for the entire crystal. This shift also correlates with the high-temperature width. The 101Ru NQR frequency as a function of temperature was also measured. No strong effect on the NQR frequency is observed at T0. Both NMR and NQR measurements suggest a connection between linewidth/disorder effects and the transition to hidden order.